Aug. 22, 2022, 11:45 a.m. | Steve Zurier

SC Magazine feed for Strategy www.scmagazine.com

In fighting today's cyberattacks, it’s critical to have a clear distinction between the actions of attackers and the behaviors routinely made by authorized users. Vectra steps in on cases where these behaviors intersect, distinguishing the adversary or insider threat from a benign user.

detection platform security technology threat threat detection vectra vulnerability management

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto