Media coverage

Attackers are quietly creeping inside your perimeter using covert communications

Sorry, this post has not been published yet, check again later!

April 21, 2016
Published by:

Information Age

Whether attackers breach perimeter defences through a targeted exploit or a broadcast botnet campaign, financial and reputational losses for victim organisations begins to occur once cybercriminals move laterally within the network – searching for, and stealing, confidential information and intellectual property, writes Vectra CSO Günter Ollmann.

Read publication

Most recent media coverage

How Organizations Can Do Their Part And Be CyberSmart Beyond National Cyber Security Awareness Month

October 20, 2020

AIThority

Read more

Barnes & Noble gets hacked; notifies customers of possible data breach

October 16, 2020

Security Week

Read more

Comment les cybers attaquants exploitent Microsoft 365 pour s’emparer des données des entreprises?

October 16, 2020

IT for Business

Read more