Ransomware explained: How digital extortion turns data into a silent hostage

Sorry, this post has not been published yet, check again later!

June 20, 2016
Published by:

Computerworld UK

Vectra explains how the correlation of multiple anomalies can be used to spot ransomware. “The detection of the malware doing its stuff was detected through three different machine learning algorithms," Vectra CSO Günter Ollmann tells Computerworld UK. "We have deliberately focused on new machine learning strategies.”

Read publication

Most recent media coverage

Cyber Conflict Overshadowed a Major Government Ransomware Alert

April 26, 2022

Dark Reading

Read more

Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’

April 22, 2022

Channel Futures

Read more

Vectra Research Exposes Cybersecurity Health Crisis

April 7, 2022

Intelligent CISO

Read more