Compromised enterprise devices detection based on abnormal behavior patterns– UEBA in action

Recently, many reports of incidents have been making headlines, proving that no business or industry is immune to advanced threat actors. Applying user and entity behavior analytics (UEBA) for the challenging task of the detection of compromised devices over time can play a critical role in enterprises’ defense mechanisms. Continue reading Compromised enterprise devices detection based on abnormal behavior patterns– UEBA in action

XDR versus Evolved SIEM ? What?s the Difference?

XDR and evolved SIEM solutions offer similar capabilities and benefits. To choose between evolved SIEM and XDR, organizations should first ask what they?re looking to achieve and consider the value of both before deciding.
The post XDR versus Evolved S… Continue reading XDR versus Evolved SIEM ? What?s the Difference?

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing this evolving threat.
The post Strategies for In… Continue reading Strategies for Insider Threat Mitigation

Diving Deeper: 4 Best Practices for Securing Enterprise Data in Office 365 (O365)

By Matt Hines, VP of Marketing at CipherCloud & Ishani Sircar, Product Marketing Manager at CipherCloud    So, here we are, both as workers and employers. The COVID-19 environment hasn’t really changed much from a workforce perspective over the las… Continue reading Diving Deeper: 4 Best Practices for Securing Enterprise Data in Office 365 (O365)

CipherCloud Chronicles #1: Two Gentlemen & The Honking Car

  Once upon a time, while driving to work- two gentlemen (the CEO and the CISO) were worried, very worried about the lack of visibility in the remote work environment. While they were happy that the productivity of their employees was at an all-ti… Continue reading CipherCloud Chronicles #1: Two Gentlemen & The Honking Car

Five Step UEBA to Detect and Stop Insider Attacks

By Ishani Sircar, Manager, Product Marketing at CipherCloud Every year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec) Despite various investments in security, most organizations are still susceptible to d… Continue reading Five Step UEBA to Detect and Stop Insider Attacks

Detect and Track Threats Through UEBA and Insights Investigate

By Ishani Sircar, Product Marketing Manager at CipherCloud The Rise of the Unmanaged Devices Most organisations are predicting an increased remote workforce and adoption of SaaS apps in the coming years. Remote work environments have led to a rapid ado… Continue reading Detect and Track Threats Through UEBA and Insights Investigate

Census Security: How Protecting Complex Cloud Systems Aids in Accuracy

The U.S. Constitution mandates a decennial census of everyone living within the country. Results determine congressional districts, apportion congressional seats for each state and guide the transfer of nearly a trillion dollars to programs’ recipients… Continue reading Census Security: How Protecting Complex Cloud Systems Aids in Accuracy

Bitglass: Deck the Cloud

With 2019 at its tail end, I can’t help but reminisce on how eventful the year has been for the Bitglass family. We started the year by securing yet another round of funding to fuel our growth and went on to be featured as a leader in Gartner’s 2019 M… Continue reading Bitglass: Deck the Cloud

Empowering Employees to Reduce Security Incidents

In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security incidents. With more and more data feeds into your security analytics products, … Continue reading Empowering Employees to Reduce Security Incidents