Will 2015 be the year of information security disruption?

Sorry, this post has not been published yet, check again later!

February 9, 2015
Published by:

CRN

With IDS/IPS and next-generation firewalls focusing on detecting the initial exploit, Vectra uncovers reconnaissance activity, lateral movement within the network and brute-force attacks into systems and processes that point to attackers acquiring data and uploading it to a remote server.

Read publication

Most recent media coverage

Cyber Conflict Overshadowed a Major Government Ransomware Alert

April 26, 2022

Dark Reading

Read more

Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’

April 22, 2022

Channel Futures

Read more

Vectra Research Exposes Cybersecurity Health Crisis

April 7, 2022

Intelligent CISO

Read more