Will 2015 be the year of information security disruption?

Sorry, this post has not been published yet, check again later!

February 9, 2015
Published by:

CRN

With IDS/IPS and next-generation firewalls focusing on detecting the initial exploit, Vectra uncovers reconnaissance activity, lateral movement within the network and brute-force attacks into systems and processes that point to attackers acquiring data and uploading it to a remote server.

Read publication

Most recent media coverage

30 Mins or Less: Rapid Attacks Extort Orgs Without Ransomware

October 13, 2021

Threatpost

Read more

Ransom Disclosure Act Would Require Victims to Disclose Ransom Payments Within 48 Hours

October 7, 2021

SECURITY Magazine

Read more

Successfully Influencing Employee Security Behavior

October 1, 2021

Security Boulevard

Read more