Media coverage

Attackers are quietly creeping inside your perimeter using covert communications

Sorry, this post has not been published yet, check again later!

April 21, 2016
Published by:

Information Age

Whether attackers breach perimeter defences through a targeted exploit or a broadcast botnet campaign, financial and reputational losses for victim organisations begins to occur once cybercriminals move laterally within the network – searching for, and stealing, confidential information and intellectual property, writes Vectra CSO Günter Ollmann.

Read publication

Most recent media coverage

Industry Reactions to Verizon 2020 DBIR: Feedback Friday

May 22, 2020

Security Week

Read more

Securing the cloud for healthcare

May 21, 2020

Beta News

Read more

UK airline easyJet data breach impacts 9M customers – expert commentary

May 20, 2020

Information Security Buzz

Read more