Media coverage

Tunneled vision: Playing hide and seek with hackers

Sorry, this post has not been published yet, check again later!

July 31, 2018
Published by:

Network Computing

"Cyberattackers build hidden tunnels within legitimate communication protocols to break into networks and steal critical data and personal information," says Matt Walmsley, Vectra EMEA director. "The tunnels are then used to remotely command-and-control an attack and exfiltrate data, while remaining undetected."

Read publication

Most recent media coverage

Jusqu’où l’intelligence artificielle peut-elle réduire le déficit d’experts en cybersécurité?

April 17, 2019

Solutions Numeriques

Read more

AI at the US Department of Homeland Security – Current Projects

April 16, 2019

Emerj

Read more

How Organizations Use Threat Intelligence To Boost Security

April 15, 2019

BrightTalk

Read more