Verizon to buy Yahoo for $4.48 billion

Sorry, this post has not been published yet, check again later!

February 21, 2017
Published by:

SC Magazine

"There's an assumption that if breached organizations are sufficiently instrumented, they can detect breaches, track attackers' activities and enumerate precisely what data they had access to," says Vectra CSO Günter Ollmann. Unfortunately, most organizations aren't sophisticated enough to identify this level of threat activity.

Read publication

Most recent media coverage

Cyber Conflict Overshadowed a Major Government Ransomware Alert

April 26, 2022

Dark Reading

Read more

Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’

April 22, 2022

Channel Futures

Read more

Vectra Research Exposes Cybersecurity Health Crisis

April 7, 2022

Intelligent CISO

Read more