Blog

Not all data is created the same

Posted by Jacob Sendowski on May 21, 2019 5:00:00 AM

Vectra customers and security researchers respond to some of the world’s most consequential threats. And they tell us there’s a consistent set of questions they must answer when investigating any given attack scenario. Starting with an alert from Cognito Detect, another security tool, or their intuition, analysts will form a hypothesis as to what is occurring.

Read More »

Topics: cyberattackers


Lurking in the shadows: Top 5 lateral spread threat behaviors

Posted by Kevin Sheu on Apr 1, 2019 2:30:00 PM

As the threat landscape evolves, the Vectra team sees budgets used to double down on larger security teams and expand perimeter defenses. It stems from an effort to increase threat detections and accelerate triage.

Unfortunately, this is a false premise.

Read More »

Topics: cyberattackers


Most attacks against energy and utilities occur in the enterprise IT network

Posted by Chris Morales on Nov 1, 2018 5:00:00 AM

The United States has not been hit by a paralyzing cyberattack on critical infrastructure like the one that sidelined Ukraine in 2015. That attack disabled Ukraine's power grid, leaving more than 700,000 people in the dark.

But the enterprise IT networks inside energy and utilities networks have been infiltrated for years. Based on an analysis by the U.S. Department of Homeland Security (DHS) and FBI, these networks have been compromised since at least March 2016 by nation-state actors who perform reconnaissance activities looking industrial control system (ICS) designs and blueprints to steal.

Read More »

Topics: cybersecurity, AI, Threat Detection, attacker behavior, critical infrastructure, IT, cyberattackers


Subscribe to the Vectra Blog



Recent Posts

Posts by Topic

Follow us