Cyberattack Bulletin: Defending Against Codefinger Ransomware in AWS S3 >
Learn about insider threats and what you can do about them.
Many security vulnerabilities stem from insecure-by-design flaws—architectural weaknesses that attackers exploit. In this video, we break down these flaws, their impact, and how to mitigate them with AI-driven threat detection.
In this final session, we shift our focus to how defenders can utilize LLMs to strengthen cybersecurity operations, enabling teams to respond more effectively to evolving threats.
In this episode, we dive into the dark side of LLMs, exploring how attackers are exploiting these advanced tools to enhance their malicious activities.
Hear stories from real Vectra AI analysts: good, bad, and everything in between.
In this session, we explore how LLMs operate in a general sense (not a cybersecurity sense - that's Part 4), their practical applications, and the unique challenges they present due to their construction.
In this session, we dive into the heart of LLMs, exploring their evolution, how they operate, and the groundbreaking discoveries that have shaped their capabilities.
Join us as we discuss the journey from Bertrand Russell's linguistic theories to the early developments in neural networks, setting the stage for the advanced AI systems we use today.
Learn about the cybercriminal group, BlackBasta.
Learn about multi-factor authentication (MFA) and what steps you can take to protect your environment.
Generative AI is now part of the enterprise. And with the adoption of these tools comes new threats. How do generative AI attacks progress, and what do defenders need to know? Find out in this threat briefing.
With the adoption of Copilot for M365, there's been a huge increase in attackers abusing it through living-off-the-land techniques. In this threat briefing, we unpack how defenders can respond.
How secure is Copilot for Microsoft 365 and how might an adversary abuse it? Find out in this threat briefing with Vectra AI's technical marketing experts.
Join the Vectra AI product team as they review the unauthenticated RCE vulnerability on a Palo Alto Firewall device — and what it means for your team.
Learn about the latest changes in attack tactics used to target hybrid enterprise environments.
Learn about the Scattered Spider attack group — who they are, how they operate, and how your organization can defend against their tactics.
Get a deep-dive look at the history of phishing, along with current tactics in the wild and how best to defend against them.
Hear about the latest ransomware trends, including Scattered Spider, and how to stop them.
Listen in as the experts discuss the Midnight Blizzard (AKA APT29) attack group — who they are, how they operate, and how to defend against their tactics.
In this talk, we will examine logging facilities in Azure, concentrating on events generated by Azure AD and Microsoft 365, and discuss multiple problems that we have observed in monitoring them.
During this demo, we will guide you through the straightforward and automated deployment process for the DeRF.
Find out about the value of combining Crowdstrike EDR capabilities with Vectra's Threat Detection and Response Platform
Vectra AI-driven Attack Signal Intelligence™ exposes the complete narrative of an attack, providing True Digital Group with a level of signal clarity that helps the SOC team focus on the critical and most urgent threats.
Learn how Vectra Match supports Federal cyber operators and policy makers.
Consolidate and streamline processes to deliver effective and efficient security operations with Vectra AI and ServiceNow.
With cyberattacks on the rise, tribal communities are shifting their focus to address their security vulnerabilities but are unsure where to start.
Learn why Microsoft Integrates Vectra AI with Microsoft Sentinel.
Learn why Microsoft Integrates Vectra AI with Microsoft Defender for Endpoint.
Tim Wade addresses both the hype and the opportunity at a practical altitude necessary for strategic decision-makers to feel confident about harnessing their inner skeptic to achieve better outcomes for the enterprise.
Cy Fenton, Chairman, National Retail Federation IT Security Council & former CISO, Ralph Lauren
Wayne Shurts, Board Director | 3x Public Company CIO | University Advisor
Hear from Dixon Styres, Solution Architect at CrowdStrike, about how their integration with Vectra Cognito helps provide a cohesive security solution as part of the SOC Visibility Triad.
Cyberthreat prevention at the network perimeter often fails silently, allowing cyberattackers to get inside without your knowledge. Learn how federal agencies solve this challenge with network detection and response (NDR).
The NDR platform from Vectra exposes covert threat behaviors in all network traffic – without requiring decryption. We enable federal agencies to detect, prioritize and respond in real time, leaving attackers with nowhere to hide
Discover the significance of seamless ecosystem integrations in the realm of threat hunting, enabling comprehensive detection and proactive defense against cyber threats.
There are two ML models. Supervised ML is tuned by data science to detect specific threat behaviors. Unsupervised ML finds anomalies. NDR platform from Vectra combines both.
Vectra delivers this when and where it’s needed so that federal agencies spend less time chasing alerts and more time stopping threats.
As U.S. SecOps teams consider mapping to the SOC visibility triad, it’s vital to know the role each part of the triad plays in stopping cyberattacks. Learn how the Vectra AI NDR platform aligns you with the SOC visibility triad.
Federal agencies can stop the progression of covert attacks inside the network by speeding-up the time to detect and reducing the dwell time of hidden adversaries. Learn how federal agencies can achieve SOC efficiency globally and at scale.
Defenders have to be right all the time, where attackers only have to get it right once. Hear from Brian Varine, Associate Director at Guidehouse and federal SOC expert, why IDS provides false alarms and is not sophisticated for the modern attacker. Learn how modern NDR approaches, like Vectra, help organizations understand what is going on within the network, including the cloud, and analyze the data to protect against attackers.
Brian Varine, Associate Director at Guidehouse and former Chief of the Justice Security Operations Center (JSOC) discusses how Zero Trust frameworks in collaboration with NDR gives organizations full visibility into their networks. Learn why AI and ML components of NDR tools allow security analysts to be more precise when threat hunting – decreasing the amount of dwell time and increasing overall SOC efficiency.
Identifying behavior is critical for detecting and stopping threats before they cause damage. Vectra help Federal Agencies hunt down attacker behaviors and shuts them down, stopping breaches at speed and scale.
Successful threat hunting is driven by AI and requires access to the right data about in-progress attacks at the right time. This allows security analysts in federal agencies to hunt intrepidly with greater success, speed, and with far less effort.
By focusing on observed privilege inside the network – knowing when it is used and knowing when it is misused – federal agencies can identify attacker behaviors such as lateral movement as well as malicious behaviors by nefarious insiders.
Autonomous security involves reasoning with complexity and influencing what occurs on the network. Vectra enables federal agencies to achieve this by combining AI, data science, ML and a vast ecosystem of third-party integrations.
Jane Lute, President & CEO for the Council on CyberSecurity and former Deputy Security for the Department of Homeland Security, discusses cybersecurity and what organizations need to do to protect themselves.
The integrated signal for extended detection and response (XDR)