Blogs

Don't let your cybersecurity vendor leave you vulnerable

The love-hate relationship with SIEMs

An immigrant CEO's story

Roundtable roundup from the European Information Security Summit

Splunk integration: A deep dive into the adaptive security architecture

An analysis of the Shamoon 2 malware attack

What’s an adaptive security architecture and why do you need it?

Shamoon 2: Same or better than the original?

Healthcare is one of cybercrime’s most targeted sectors

Our focus on Russian hacking obscures the real problem

Security automation isn't AI security

The UEBA market will be gone by 2022

“We have got to get faster” at fighting hacks

Encrypt everything. Don’t let security be the reason you don’t (and attackers do)

Cybersecurity: What to expect in 2017

Cyber attack of the clones

Politics and the bungling of big data

InfoSec skills shortage: The No. 1 threat to Internet security

The election hackers: Some uncovered points

Moonlight – Targeted attacks in the Middle East

Triggering MS16-030 via targeted fuzzing

Exploiting the firewall beachhead: A history of backdoors into critical infrastructure

Bringing attack detections to the data center

Reverse engineering the Shadow Brokers dump: A close look at NOPEN

From the Iron Age to the “Machine Learning Age”

Accelerating action: New technology partnerships help customers bridge the cybersecurity gap

The new vulnerability that creates a dangerous watering hole in your network

Own a printer, own a network with point and print drive-by

Time to update how we manage and address malware infections

Ransomware, encryption and machine learning – Three key takeaways from Infosecurity 2016

Ransomware lessons from Julius Caesar

DPI goes blind as encryption adoption increases

Introducing the Spring 2016 Post-Intrusion Report

Canary in the ransomware mine

Plan on losing visibility of your network traffic: Steps to take control

Apple vs. the FBI: Some points to consider

The Chocolate Sprinkles of InfoSec

Who is watching your security technology?

Blocking Shodan

Turning a Webcam Into a Backdoor

Cybersecurity in 2016: A look ahead

Automate to optimise your security teams

Insider Threats: Spotting “the Inside Job“

Will IDS ever be able to detect intrusions again?

A revolutionary new approach to detecting malicious covert communications

Vectra Threat Labs discovers vulnerabilities in Adobe Reader and Internet Explorer

Takeaways from Gartner Security and Risk Management UK

The Impact of IoT on Your Attack Surface

Cybersecurity and machine learning: The right features can lead to success

The industry needs a real alternative to signatures

Belkin F9K1111 V1.04.10 Firmware Analysis

Microsoft Internet Explorer 11 Zero-day

Is your thermostat spying? Cyberthreats and the Internet of Things

Think outside the sandbox

What cyber threats are lurking about in your network?

Duqu: The Sequel

Insider threats surge while budgets retreat

Technical analysis of Hola

Automate detection of cyber threats in real time. Why wait?

Cybersecurity, data science and machine learning: Is all data equal?

Dyre Malware Games the Test

Big Data Sends Cybersecurity Back to the Future

Do you know how to protect your key assets?

Cybersecurity Sensors – Threat Detection Throughout a Distributed Network

Creating Cyber Security That Thinks

Superfish: When Bloatware Goes Bad

Cyber Attackers Are Digital Termites

The Carbanak APT - Redefining Banking Malware

The Anthem Breach and Security Going Forward

Detecting the Insider Threat – how to find the needle in a haystack?

Morgan Stanley Meets the Insider Threat

Malicious Insider Psychology – when the personal bubble bursts

Malicious Insider Psychology – when pressure builds up in the Fraud Triangle

Community Threat Analysis Uncovers Insider Attacks

Insider attacks pose a serious threat to critical U.S. infrastructure

Applying Vectra to the Regin Malware

Insider Threats - the myth of the black swan

Insider Threats - how they affect US companies

Insider Threats - is your organization safe?

Insiders – Threat or Blessing?

Don't Shed Tears When Peeling the Onion Router

Attackers Lurk in my Network, but Nothing Reports it

Catch Attackers Attempting to Shellshock You

Vectra detections will enable Juniper to block cyberattacks via API

Detecting Future Heartbleed Security Exploits

Art of Scoring Malware Detections – Friend or Foe?

Packet Pushers Shines Critical Light on New Cyber Security Solution

Reducing the Cyber Security Risk for BYOD – Can you have your gadgets and use them too?

The Hidden Risk of Not Detecting Bitcoin Mining

Are We Secure?

Responding to a Priority One Malware Attack

Heartbleed on the Inside

I'll Have Two BYOD and One Mobile, Hold the Malware Threats Please

Finding Signals in Security's White Noise

Divining Attacker Intent

Security Report Season: what malware does versus what it is.

Does Your Security Architecture Adapt to Changing Threats?