Media coverage

It's behavior, not names, that gives attackers away

Sorry, this post has not been published yet, check again later!

May 19, 2016
Published by:

CSO

“There seems to be a lot of pride in naming threats,” says Mike Banic, vice president of Vectra Networks, “but a lot of them behave in similar ways, and you don’t need a signature to recognize that. The IP address and the URL may change, but the fundamental behavior will not.”

Read publication

Most recent media coverage

Manufacturing Spending Billions on IoT, But Still Can’t Patch Windows or Remember Passwords

May 21, 2019

Channel Daily News

Read more

Chinese-Made Drones Could Transmit Flight Data Back to Makers, Gov’t, DHS CISA Warns

May 21, 2019

SC Magazine

Read more

DHS Issues Alert on Chinese-Made Drones

May 21, 2019

Infosecurity Magazine

Read more