Aug. 22, 2022, 11:46 a.m. | Steve Zurier

SC Magazine feed for Strategy www.scmagazine.com

In fighting today's cyberattacks, it’s critical to have a clear distinction between the actions of attackers and the behaviors routinely made by authorized users. Vectra steps in on cases where these behaviors intersect, distinguishing the adversary or insider threat from a benign user.

intelligence platform security technology threat threat intelligence vectra

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)