Observing Privilege to Reduce Risk In Software as a Service
Chris Morales, head of security analytics, discusses risk in a SaaS environments and why it is largely an identity problem — specifically, it is a misuse of identity and the privileged access granted to that identity.
Securing Data and Remote Workers During COVID
Our CEO, Hitesh Sheth, speaks with Chuck Harold from Security Guy TV about three fundamentals platforms for security operations centers and how to secure data and your remote workers during this global pandemic.
Considerations when selecting your managed security services provider (MSSP)
While many organisations outsourcing specific security capabilities to MSSPs in order to cope with challenges in the cybersecurity sector, here's some advice on key things you consider when choosing an MSSP.
Cyber attack Camera giant Canon hit by Maze ransomware attack
Matt Walmsley comments on the Canon ransomware attack and and how attackers are exploiting privileged accounts which can allow them to deploy their tools and access all the data they need in order to finalise their ransomware attack and coerce their victims.
Canon said to be latest Maze ransomware victim
Canon is the latest victim of the Maze ransomware, which is even more dangerous as data is not only encrypted and held to ransom, but stolen and leaked using "name and shame" tactics.
How AI is helping in the fight against coronavirus and cybercrime
Learn why data centres represent such a valuable target for cybercriminals and how, despite the vast security measures put in place by enterprises, they are able to infiltrate a data centre system and how you can protect yourself.
China targets networks with new Taidoor malware attacks
Governments agencies warning and providing guidance and identification about for RATs such as TAIDOOR is good, this also shows that the pathways and services that RATs exploit remain open and hard to monitor for many organizations. More from Matt Walmsley in this article.
Chinese-speaking hackers increase activity and diversify cyberattack methods
Our own Matt Walmsley explains why there’s plenty of opportunities for RATs to operate undiscovered for extended periods as they hide in plain sight, especially during this time when there is so much legitimate remote access going on.
Misconfigured servers contributed to more than 200 cloud breaches
Vectra's Chris Morales comments on the recent Accurics report that most cloud deployments had at least one major security exposure and why this is not surprising due to rapid cloud development and lack of understanding to how cloud configuration works and the potential pitfalls by an industry historically versed in securing access to physical systems.
US Carlson Wagonlit Travel pays a $4.5m ransom to get its data back
Learn why ransomware attackers tend to seek privileged entities associated to accounts, hosts and services due to the unrestricted access they can provide and to ease replication and propagation.
CISA, FBI and DoD issue alert on TAIDOOR, new Chinese malware variant
Learn why with so much legitimate remote access happening across our networks and hosts, there’s plenty of opportunity for skilled attackers can easily customize or build their own RATs using common remote desktop tools such as RDP to exert remote access.
Canon Ransom Attack Highlights Rise of "Name and Shame" Tactics
“These attackers will attempt to exploit, coerce, and capitalise on organisations’ valuable digital assets.” said Matt Walmsley, EMEA director at Vectra.
CWT Travel Agency Faces $4.5M Ransom in Cyberattack
"The bullying tactics used by these ransomware groups are making attacks even more expensive, and they are not going to stop any time soon, particularly within the current climate," says Matt Walmsley, EMEA Director at Vectra
First Rule of Ransomware Club is Do Not Pay the Ransom, but it Looks Like Carlson Wagonlit Travel Didn't Get the Memo
Our Matt Walmsley comments on the devious tactics that go behind ransomware attacks.
SEI Investments: Vendor Hit by Ransomware, Data Leaked
Tim Wade, CTO technical director at Vectra, comments on the increased cybersecurity risks of third-party vendors.
Vectra Expands Global Footprint Through Enriched Channel Partner Program
Our Jessica Couto interviews with E-ChannelNews on how Vectra's new channel partner program is designed to support partner's unique needs and focus on securing customer success.
Vectra Refond Son Programme Pour Toucher plus de Partenaire
En France, Vectra compte une cinquantaine de clients, dont principalement des grands groupes et une douzaine de partenaires, comme Nomios ou Exclusive Networks. Installé sur le territoire depuis 2017, l’éditeur souhaite désormais élargir son réseau de partenaires pour toucher les entreprises de toutes tailles, y compris les petites entreprises. Objectif : compter 20 partenaires fin 2020.
Vectra’s New Services Enable Enterprises to Increase Security Operations
Vectra's new advisory and operational services allows for accelerated time-to-value on NDR projects and improved maturity of security operations.
Vectra Introduces Advisory And Operational Cybersecurity Services
“We bring an experienced lens during this transformation that enables customers to understand and address the full scope of risks across the new threat landscape," says Jennifer Wang, vice president of customer success at Vectra.
Vectra Announces a Range of New Advisory and Operational Cybersecurity Services
Vectra's new new advisory and operational services provide organizations gives organization 24/7 access to consultants and analysts.
Vectra Launches New Advisory and Operational Cybersecurity Services
"As we continue to grow and expand our global presence, protecting our customers' business and fully enabling their security capabilities is fundamental to our 'customer-first' company culture," says Vectra CEO Hitesh Sheth.
Vectra Launches New Advisory And Operational Cybersecurity Services
Vectra rolls out new range of advisory and operational cybersecurity services to reduce the risk of data breaches for enterprises.
New Advisory And Operational Cybersecurity Services
“We bring an experienced lens during this transformation that enables customers to understand and address the full scope of risks across the new threat landscape,” says Jennifer Wang, vice president of customer success at Vectra.
“Confusing and reeks of politics”: Cybersecurity Community Reacts to Russia Report
“It’s a phenomenon we’ve seen in our own analysis from inside operators of critical national infrastructure. For example, attackers have tested and mapped-out attacks against energy and utilities networks for years," says Matt Walmsley, EMEA Director at Vectra
Vectra launches new advisory and operational cybersecurity services
Learn about the new range of advisory and operational cybersecurity services that enable enterprises to increase security operations efficiency and significantly reduce the risk of data breaches from Vectra.