Media coverage

Will 2015 be the year of information security disruption?

Sorry, this post has not been published yet, check again later!

February 9, 2015
Published by:

CRN

With IDS/IPS and next-generation firewalls focusing on detecting the initial exploit, Vectra uncovers reconnaissance activity, lateral movement within the network and brute-force attacks into systems and processes that point to attackers acquiring data and uploading it to a remote server.

Read publication

Most recent media coverage

Manufacturing Spending Billions on IoT, But Still Can’t Patch Windows or Remember Passwords

May 21, 2019

Channel Daily News

Read more

Chinese-Made Drones Could Transmit Flight Data Back to Makers, Gov’t, DHS CISA Warns

May 21, 2019

SC Magazine

Read more

DHS Issues Alert on Chinese-Made Drones

May 21, 2019

Infosecurity Magazine

Read more