7 threat detection challenges CISOs face and what they can do about it

Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 million new malware variants in 2021 alone. As a result, the burden on CISOs and t… Continue reading 7 threat detection challenges CISOs face and what they can do about it

The evolution of security analytics

As networks continue to evolve and security threats get more complex, security analytics plays an increasingly critical role in securing the enterprise. By combining software, algorithms and analytic processes, security analytics helps IT and security … Continue reading The evolution of security analytics

Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes

While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense. Continue reading Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes

XDR: Unifying incident detection, response and remediation

According to IBM’s Cost of a Data Breach Report 2020, the average time it took a company in 2019 to identify and contain a breach was 279 days. It was 266 days in 2018 and the average over the past five years was a combined 280 days. In other wor… Continue reading XDR: Unifying incident detection, response and remediation

How to enforce real-time controls based on behavior risk scoring

For decades, the traditional approach to securing digital assets has been based on using a primary set of credentials, namely a username and password. This binary model – a user supplies his/her credentials and they are allowed into the network, … Continue reading How to enforce real-time controls based on behavior risk scoring

The Enemy Within: How Insider Threats Are Changing

Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk. Continue reading The Enemy Within: How Insider Threats Are Changing

Exploring the risky behavior of IT security professionals

Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their jobs. Meanwhile, nearly 40% of respondents who experienced bad performance r… Continue reading Exploring the risky behavior of IT security professionals

Gurucul unveils cloud-native Unified Security and Risk Analytics platform

Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced Gurucul Unified Security and Risk Analytics, the first cloud-native data science driven platform that unifies key Cyber Defense Center function… Continue reading Gurucul unveils cloud-native Unified Security and Risk Analytics platform

Gurucul launches new AI/ML behavior analytics for guided proactive hunting of unknown threats

Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, introduced automated intelligent threat hunting that uses artificial intelligence (AI) and machine learning (ML) to detect behaviors associated with cybe… Continue reading Gurucul launches new AI/ML behavior analytics for guided proactive hunting of unknown threats

Gurucul Risk Analytics platform automates threat detection and response for MITRE ATT&CK Framework

Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced the Gurucul Risk Analytics (GRA) platform has added and aligned machine learning (ML) models to detect and enable automated responses to advers… Continue reading Gurucul Risk Analytics platform automates threat detection and response for MITRE ATT&CK Framework