Vectra Terms & Conditions of Sale
Vectra Terms & Conditions of Sale
Read MoreVectra Terms & Conditions of Sale
Read More2023-03: ACSC Ransomware Profile – Lockbit 3.0 https://www.cyber.gov.au/about-us/advisories/2023-03-acsc-ransomware-profile-lockbit-3.0
Read MoreApril 22 2022: The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) associated with attacks involving BlackCat/ALPHV, a Ransomware-as-a-Service that has compromised at least 60 entities worldwide. CISA encourages users and administrators to…
Read MoreAustralian organisations are encouraged to urgently adopt an enhanced cyber security position. Organisations should act now and follow ACSC’s advice to improve their cyber security resilience in light of the heightened threat environment. https://www.cyber.gov.au/acsc/view-all-content/alerts/australian-organisations-encouraged-urgently-adopt-enhanced-cyber-security-posture
Read MoreApache Log4j is a Java-based logging platform that can be used to analyse web server access logs or application logs. The software is heavily used in the enterprise, eCommerce platforms, and games, such as Minecraft who rushed out a patched…
Read MoreArtificial Intelligence Webinar Artificial Intelligence is still somewhat unfamiliar territory to most people worldwide; however, it's becoming an integral part of cyber security. In partnership with IBM, Vectra Corporation hosted the Artificial Intelligence: How We Use It in Cyber Security…
Read MoreGlobal Contribution "The optimist invents the aeroplane; the pessimist invents the parachute." George Bernard Shaw Suppose a product is introduced to the market. In that case, it is not always guaranteed that it has already reached its optimum and…
Read MoreADAssessor How vulnerable is your Active Directory? Active Directory (AD) is a Microsoft product consisting of several services to administer permissions and access to networked resources on a Windows Network. Because it is the primary source of information for all…
Read MoreRansomware Since the start of the pandemic, wherein the majority of the companies were forced to migrate their work from office to home, there has been a steady increase in cyber-attacks recorded. Since almost all types of work have been…
Read More