cPacket cStor 100 sets new standard for capturing, storing, and analyzing network packet data
cPacket Networks announced a new addition to its cStor series packet capture appliances in support of the latest data center consolidation, 100Gbps migration, and cyber …
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
3 in 4 companies have experienced account takeover attacks in the last year
The COVID-19 pandemic has accelerated cloud migration and digital transformation amongst 88% of companies and that 71% of Microsoft Office 365 deployments have suffered an …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092801/office365-400x200.jpg)
Cybercriminals are using legitimate Office 365 services to launch attacks
Vectra released its report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in …
![Vectra Cognito platform](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093428/vectra-cognito-platform-400x200.jpg)
Security pros need more and better visibility into their cloud networks
In this Help Net Security podcast, Kevin Sheu, VP Product Marketing and Marcus Hartwig, Senior Product Marketing Manager at Vectra AI, discuss the Vectra superhero survey from …
Vectra establishes business operations in the Asia-Pacific region
Vectra announced that it has established business operations in the Asia-Pacific region to arm enterprise organisations and managed detection and response providers with a …
![Black Hat USA 2019](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093653/bhusa2019-1-400x200.jpg)
Photo gallery: Black Hat USA 2019
Black Hat USA 2019 is underway in Las Vegas. Here are a few photos from the Business Hall and the Arsenal. Featured companies: Qualys, Anomali, Vectra, Irdeto, ReliaQuest, F5 …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
What’s cybercriminals’ most effective weapon in a ransomware attack?
Cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102608/healthcare-400x200.jpg)
Legacy infrastructures and unmanaged devices top security risks in the healthcare industry
The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable …
![Marriott](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095631/marriott-400x200.jpg)
Industry reactions to the enormous Marriott data breach
On September 8, 2018, Marriott received an alert from an internal security tool regarding an attempt to access the Starwood guest reservation database in the United States. …
![Black Hat USA 2018](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100437/bhusa-gallery-2-400x200.jpg)
Photo gallery: Black Hat USA 2018, part 2
Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall. Featured companies: LogRhythm, Carbon Black, Swimlane, Qualys, Cofense, Vectra, …
![CloudPassage](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102418/cloudpassage-containter-secure-400x200.png)
New infosec products of the week: December 1, 2017
Automated security and compliance solution for Docker containers CloudPassage unveiled Container Secure, a set of automated compliance and security controls for containers. …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD