Media coverage

Ransomware explained: How digital extortion turns data into a silent hostage

Sorry, this post has not been published yet, check again later!

June 20, 2016
Published by:

Computerworld UK

Vectra explains how the correlation of multiple anomalies can be used to spot ransomware. “The detection of the malware doing its stuff was detected through three different machine learning algorithms," Vectra CSO Günter Ollmann tells Computerworld UK. "We have deliberately focused on new machine learning strategies.”

Read publication

Most recent media coverage

The race is on

September 12, 2019

New Electronics

Read more

California passes bill to ban police use of facial recognition

September 12, 2019

Threatpost

Read more

Vectra unveils privilege-aware network detection and response solution

September 12, 2019

Tahawul Tech

Read more