Blogs

September 13, 2017 - Gain Visibility and Automate Threat Hunting in the Cloud with Gigamon and Vectra

August 24, 2017 - WannaCry still lingering

August 10, 2017 - Man + Machine is the winning combo for combatting cyber threats

July 3, 2017 - (Artificial) Intelligence on the EU GDPR

June 28, 2017 - Goldeneye. Petya. WannaCry. It's all ransomware.

June 26, 2017 - Why it's okay to be underwhelmed by Cisco ETA

June 23, 2017 - How AI detects and mitigates cyber attacks in software-defined data centers

June 14, 2017 - A behind-the-scenes look at how cybercriminals carry out attacks inside enterprise networks

May 16, 2017 - Vectra detection and response to WannaCry ransomware

May 13, 2017 - Fighting the ransomware pandemic

May 4, 2017 - How to win the cybersecurity battle in healthcare

April 26, 2017 - Security that thinks is now thinking deeply

April 20, 2017 - The existential threat of IP theft

April 10, 2017 - Don't blow your IT security budget on flow analysis

March 30, 2017 - AI: Is science fiction on a collision course with science fact?

March 29, 2017 - Stealthy ransomware: Extortion evolves

March 23, 2017 - Don't let your cybersecurity vendor leave you vulnerable

March 7, 2017 - The love-hate relationship with SIEMs

March 7, 2017 - An immigrant CEO's story

February 23, 2017 - Roundtable roundup from the European Information Security Summit

February 9, 2017 - Splunk integration: A deep dive into the adaptive security architecture

February 7, 2017 - An analysis of the Shamoon 2 malware attack

February 2, 2017 - What’s an adaptive security architecture and why do you need it?

January 28, 2017 - Shamoon 2: Same or better than the original?

January 26, 2017 - Healthcare is one of cybercrime’s most targeted sectors

January 19, 2017 - Our focus on Russian hacking obscures the real problem

January 17, 2017 - Security automation isn't AI security

January 11, 2017 - The UEBA market will be gone by 2022

January 5, 2017 - “We have got to get faster” at fighting hacks

December 15, 2016 - Encrypt everything. Don’t let security be the reason you don’t (and attackers do)

December 13, 2016 - Cybersecurity: What to expect in 2017

November 27, 2016 - Cyber attack of the clones

November 17, 2016 - Politics and the bungling of big data

November 15, 2016 - InfoSec skills shortage: The No. 1 threat to Internet security

October 26, 2016 - Moonlight – Targeted attacks in the Middle East

October 11, 2016 - Triggering MS16-030 via targeted fuzzing

September 28, 2016 - Exploiting the firewall beachhead: A history of backdoors into critical infrastructure

September 13, 2016 - Bringing attack detections to the data center

September 13, 2016 - Reverse engineering the Shadow Brokers dump: A close look at NOPEN

August 30, 2016 - From the Iron Age to the “Machine Learning Age”

August 4, 2016 - Accelerating action: New technology partnerships help customers bridge the cybersecurity gap

July 12, 2016 - The new vulnerability that creates a dangerous watering hole in your network

July 12, 2016 - Own a printer, own a network with point and print drive-by

June 28, 2016 - Time to update how we manage and address malware infections

June 15, 2016 - Ransomware, encryption and machine learning – Three key takeaways from Infosecurity 2016

June 7, 2016 - Ransomware lessons from Julius Caesar

June 1, 2016 - DPI goes blind as encryption adoption increases

April 20, 2016 - Introducing the Spring 2016 Post-Intrusion Report

March 30, 2016 - Canary in the ransomware mine

March 8, 2016 - Plan on losing visibility of your network traffic: Steps to take control

February 18, 2016 - Apple vs. the FBI: Some points to consider

February 2, 2016 - The Chocolate Sprinkles of InfoSec

January 28, 2016 - Who is watching your security technology?

January 20, 2016 - Blocking Shodan

January 12, 2016 - Turning a Webcam Into a Backdoor

January 6, 2016 - Cybersecurity in 2016: A look ahead

January 4, 2016 - Automate to optimise your security teams

December 14, 2015 - Insider Threats: Spotting “the Inside Job“

November 3, 2015 - Will IDS ever be able to detect intrusions again?

October 28, 2015 - A revolutionary new approach to detecting malicious covert communications

October 14, 2015 - Vectra Threat Labs discovers vulnerabilities in Adobe Reader and Internet Explorer

October 12, 2015 - Takeaways from Gartner Security and Risk Management UK

September 29, 2015 - The Impact of IoT on Your Attack Surface

September 15, 2015 - Cybersecurity and machine learning: The right features can lead to success

September 9, 2015 - The industry needs a real alternative to signatures

August 19, 2015 - Belkin F9K1111 V1.04.10 Firmware Analysis

July 14, 2015 - Microsoft Internet Explorer 11 Zero-day

July 13, 2015 - Is your thermostat spying? Cyberthreats and the Internet of Things

July 8, 2015 - Think outside the sandbox

June 23, 2015 - What cyber threats are lurking about in your network?

June 12, 2015 - Duqu: The Sequel

June 4, 2015 - Insider threats surge while budgets retreat

June 1, 2015 - Technical analysis of Hola

May 15, 2015 - Automate detection of cyber threats in real time. Why wait?

May 9, 2015 - Cybersecurity, data science and machine learning: Is all data equal?

May 7, 2015 - Dyre Malware Games the Test

April 1, 2015 - Big Data Sends Cybersecurity Back to the Future

March 27, 2015 - Do you know how to protect your key assets?

March 24, 2015 - Cybersecurity Sensors – Threat Detection Throughout a Distributed Network

March 9, 2015 - Creating Cyber Security That Thinks

March 4, 2015 - Superfish: When Bloatware Goes Bad

March 1, 2015 - Cyber Attackers Are Digital Termites

February 19, 2015 - The Carbanak APT - Redefining Banking Malware

February 6, 2015 - The Anthem Breach and Security Going Forward

January 10, 2015 - Detecting the Insider Threat – how to find the needle in a haystack?

January 6, 2015 - Morgan Stanley Meets the Insider Threat

December 22, 2014 - Malicious Insider Psychology – when the personal bubble bursts

December 13, 2014 - Malicious Insider Psychology – when pressure builds up in the Fraud Triangle

December 10, 2014 - Community Threat Analysis Uncovers Insider Attacks

December 7, 2014 - Insider attacks pose a serious threat to critical U.S. infrastructure

December 3, 2014 - Applying Vectra to the Regin Malware

November 30, 2014 - Insider Threats - the myth of the black swan

November 22, 2014 - Insider Threats - how they affect US companies

November 16, 2014 - Insider Threats - is your organization safe?

November 12, 2014 - Insiders – Threat or Blessing?

November 11, 2014 - Don't Shed Tears When Peeling the Onion Router

November 10, 2014 - Attackers Lurk in my Network, but Nothing Reports it

September 29, 2014 - Catch Attackers Attempting to Shellshock You

September 9, 2014 - Vectra detections will enable Juniper to block cyberattacks via API

August 22, 2014 - Detecting Future Heartbleed Security Exploits

August 15, 2014 - Art of Scoring Malware Detections – Friend or Foe?

August 14, 2014 - Packet Pushers Shines Critical Light on New Cyber Security Solution

August 1, 2014 - Reducing the Cyber Security Risk for BYOD – Can you have your gadgets and use them too?

June 6, 2014 - The Hidden Risk of Not Detecting Bitcoin Mining

May 28, 2014 - Are We Secure?

May 7, 2014 - Responding to a Priority One Malware Attack

May 2, 2014 - Heartbleed on the Inside

April 29, 2014 - I'll Have Two BYOD and One Mobile, Hold the Malware Threats Please

April 22, 2014 - Finding Signals in Security's White Noise

April 17, 2014 - Divining Attacker Intent

April 2, 2014 - Security Report Season: what malware does versus what it is.

March 25, 2014 - Does Your Security Architecture Adapt to Changing Threats?

Subscribe to the Vectra Blog



Follow us