Most IT pros find red team exercises more effective than blue team testing

More than one-third of security professionals’ defensive blue teams fail to catch offensive red teams, a study from Exabeam reveals. The survey, conducted at Black Hat USA 2019, also showed that 68% find red team exercises more effective than blue team… Continue reading Most IT pros find red team exercises more effective than blue team testing

What is Big Data?

If you want an effective User and Entity Behavior Analytics (UEBA) solution, you’re going to need to leverage Big Data analytics. Coined in 2001, Gartner’s Big Data definition refers to “high-volume, high-velocity and/or high-variety … Continue reading What is Big Data?

How Many Reports Does It Take to Make Sense of Your Data?

We get a lot of briefing requests from market research firms. On this day, we were briefing a research director of a global firm on our Gurucul Fraud Analytics platform. We were demonstrating our product capabilities and showing our Reports module. Our… Continue reading How Many Reports Does It Take to Make Sense of Your Data?

A Security Evolution: Taking Security Beyond SIEM with Behavior Analytics

What makes Gurucul stand out among the many security analytics vendors? Well, for starters, Gurucul’s…
The post A Security Evolution: Taking Security Beyond SIEM with Behavior Analytics appeared first on Gurucul.
The post A Security Evolution: Taking… Continue reading A Security Evolution: Taking Security Beyond SIEM with Behavior Analytics

Product showcase: Veriato Cerebral user & entity behavior analytics software

When it comes to identifying and stopping insider data security threats, actionable insights into people’s behaviors are invaluable. Employees involved in negative workplace events, contractors with access to critical systems and sensitive data, and de… Continue reading Product showcase: Veriato Cerebral user & entity behavior analytics software

Employee Hacks: Spotting Insider Threats

Organizations face security threats such as data breaches from numerous sources, however many only consider attacks from external sources. However, 60 percent of attacks are the result of trusted insiders with access to sensitive intellectual property… Continue reading Employee Hacks: Spotting Insider Threats

Cybersecurity pros don’t feel equipped to stop insider attacks

Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the pressure from insider threats and are ramping up detection, prevention and re… Continue reading Cybersecurity pros don’t feel equipped to stop insider attacks

What if defenders could see the future? Many clues are out there

Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control activity. To reduce adversaries’ time to operate, security professionals s… Continue reading What if defenders could see the future? Many clues are out there

The evil of vanity metrics

With the fast-paced evolution of tools and connectedness in business operations, the amount of network and log data has exploded. However, organizations have largely failed to adjust their approach to managing and analyzing that growing collection of l… Continue reading The evil of vanity metrics