Media coverage

Cold boot attack method leaves laptops vulnerable

Sorry, this post has not been published yet, check again later!

October 4, 2018
Published by:

ITProToday

“A proper response should include the revocation of credentials and user access from that system," says Chris Morales, head of security analytics at Vectra. "This works if the proper response policy is in place and users know to respond quickly to IT before potential access and compromise occurs.”

Read publication

Most recent media coverage

Jusqu’où l’intelligence artificielle peut-elle réduire le déficit d’experts en cybersécurité?

April 17, 2019

Solutions Numeriques

Read more

AI at the US Department of Homeland Security – Current Projects

April 16, 2019

Emerj

Read more

How Organizations Use Threat Intelligence To Boost Security

April 15, 2019

BrightTalk

Read more