ABCs of UEBA: S is for Sabotage

Sabotage is the worst type of cyberattack. Stealing data is one thing, and it’s a…
The post ABCs of UEBA: S is for Sabotage appeared first on Gurucul.
The post ABCs of UEBA: S is for Sabotage appeared first on Security Boulevard.
Continue reading ABCs of UEBA: S is for Sabotage

AI Driven SOC Automation

As California, where Gurucul is based, rolls into another full lockdown over the Holidays and…
The post AI Driven SOC Automation appeared first on Gurucul.
The post AI Driven SOC Automation appeared first on Security Boulevard.
Continue reading AI Driven SOC Automation

Insider Threat Case Studies: Why You Need Advanced Behavior Analytics

We’ve talked a lot about Insider Threats.  They are a Big Deal™ and deserve the…
The post Insider Threat Case Studies: Why You Need Advanced Behavior Analytics appeared first on Gurucul.
The post Insider Threat Case Studies: Why You Need Advanced Beh… Continue reading Insider Threat Case Studies: Why You Need Advanced Behavior Analytics

Ransomware vs Healthcare: A Dangerous Liaison

On October 29th, just before Halloween, the Cybersecurity and Infrastructure Security Agency (CISA) released an…
The post Ransomware vs Healthcare: A Dangerous Liaison appeared first on Gurucul.
The post Ransomware vs Healthcare: A Dangerous Liaison … Continue reading Ransomware vs Healthcare: A Dangerous Liaison

Securing Internet-Connected Devices in Healthcare

We’ve been talking about Cybersecurity Awareness Month in the last couple of posts, following along…
The post Securing Internet-Connected Devices in Healthcare appeared first on Gurucul.
The post Securing Internet-Connected Devices in Healthcare appe… Continue reading Securing Internet-Connected Devices in Healthcare

Securing Devices at Work and at Home

It’s still October and still Cybersecurity Awareness Month and, in keeping in line with the…
The post Securing Devices at Work and at Home appeared first on Gurucul.
The post Securing Devices at Work and at Home appeared first on Security Boulevard.
Continue reading Securing Devices at Work and at Home