Best Practices for Implementing an Insider Threat Program

During the final week of National Insider Threat Awareness month, we’ll talk about best practices... The post Best Practices for Implementing an Insider Threat Program appeared first on Gurucul ... Read More
™

Why Real-Time Analytics Is Important for Efficacy and Reduction of False Positives in a SIEM

Legacy Security Information and Event Management (SIEM) systems trigger high false positives and negatives that... The post Why Real-Time Analytics Is Important for Efficacy and Reduction of False Positives in a SIEM appeared first on Gurucul ... Read More
™

A One-Two Punch to Stop Misuse of Privileged Accounts: Identity Analytics Combined with UEBA

Misused privileged accounts continue to be a leading attack vector for some of the largest... The post A One-Two Punch to Stop Misuse of Privileged Accounts: Identity Analytics Combined with UEBA appeared first on Gurucul ... Read More

How MITRE ATT&CK Coverage Improves the Effectiveness of Your SIEM

| | Blog, MITRE ATT&CK, SIEM
Security Information and Event Management (SIEM) is an important part of IT security management that... The post How MITRE ATT&CK Coverage Improves the Effectiveness of Your SIEM appeared first on Gurucul ... Read More

Monitoring User Behavior is The Solution to Combat System Breaches

Protecting systems has never been more challenging. Boundaries for systems are blurring due to the... The post Monitoring User Behavior is The Solution to Combat System Breaches appeared first on Gurucul ... Read More
Button: Watch Now

New Year, Same Breaches, Worse Outcomes

2021 has been a boon for cybercrime. In January, T-Mobile reported a breach that compromised... The post New Year, Same Breaches, Worse Outcomes appeared first on Gurucul ... Read More

How Access Analytics Solves Critical Security Controls

Companies are continuously being challenged with providing visibility into access risks. Access analytics uses machine... The post How Access Analytics Solves Critical Security Controls appeared first on Gurucul ... Read More
Global InfoSec Awards for 2021 Winner

May I Have The Envelope Please…

If you’re a fan of the show Schitt’s Creek, you’ll know this famous exchange between... The post May I Have The Envelope Please… appeared first on Gurucul ... Read More
tree and cluster

Machine Learning 101

Machine Learning is ingrained in our day-to-day life. It is part of our spam filters... The post Machine Learning 101 appeared first on Gurucul ... Read More

Do You Think Your Healthcare Data Is Safe?

The HIPAA Journal is reporting that in March of 2021, we saw a 38.8% increase... The post Do You Think Your Healthcare Data Is Safe? appeared first on Gurucul ... Read More