Leveraging Machine Learning for Cross-Channel Fraud Detection

Financial fraud occurs every day, accumulating in trillions of dollars in losses each year. In some…
The post Leveraging Machine Learning for Cross-Channel Fraud Detection appeared first on Gurucul.
The post Leveraging Machine Learning for Cross… Continue reading Leveraging Machine Learning for Cross-Channel Fraud Detection

Top 10 Cybersecurity Blog Posts of 2019

How serious was cybercrime in 2019? According to research firm Risk Based Security, 2019 was…
The post Top 10 Cybersecurity Blog Posts of 2019 appeared first on Gurucul.
The post Top 10 Cybersecurity Blog Posts of 2019 appeared first on Security Boul… Continue reading Top 10 Cybersecurity Blog Posts of 2019

Security Analytics Is the New Approach to IoT Security

Way back in the early 1980s, ambitious students in the computer science building at Carnegie…
The post Security Analytics Is the New Approach to IoT Security appeared first on Gurucul.
The post Security Analytics Is the New Approach to IoT Security a… Continue reading Security Analytics Is the New Approach to IoT Security

The Role of Security Analytics in a Zero Trust Environment

Trust but verify, the old Russian proverb advises us. And while this once could have…
The post The Role of Security Analytics in a Zero Trust Environment appeared first on Gurucul.
The post The Role of Security Analytics in a Zero Trust Environment a… Continue reading The Role of Security Analytics in a Zero Trust Environment

Different Insider Threat Personas and How To Detect Them

This month we were a sponsor and exhibitor at the Gartner Security and Risk Management…
The post Different Insider Threat Personas and How To Detect Them appeared first on Gurucul.
The post Different Insider Threat Personas and How To Detect Them app… Continue reading Different Insider Threat Personas and How To Detect Them