Media coverage

Attackers are quietly creeping inside your perimeter using covert communications

Sorry, this post has not been published yet, check again later!

April 21, 2016
Published by:

Information Age

Whether attackers breach perimeter defences through a targeted exploit or a broadcast botnet campaign, financial and reputational losses for victim organisations begins to occur once cybercriminals move laterally within the network – searching for, and stealing, confidential information and intellectual property, writes Vectra CSO Günter Ollmann.

Read publication

Most recent media coverage

What’s cybercriminals’ most effective weapon in a ransomware attack?

September 19, 2019

(In)secure Magazine

Read more

Cyberwar is here: Are you ready?

September 19, 2019

PC Magazine

Read more

Capital One: What’s in your cloud?

September 19, 2019

Security Magazine

Read more