Download Now

Insider Threat Survey Report: RSA 2019

At the 2019 RSA Conference, Gurucul conducted an Insider Threat Survey. We wanted to get a sense for just how prevalent the Insider Threat is in the minds of the practitioners. 671 international IT professionals responded, which is incredible! The Gurucul Insider Threat Survey Report contains the survey questions and ... Read More

Look At Risk as More of a Compass Than a Watch

We had a great week at RSAC 2019, and a highlight of the week was a well-attended CISO roundtable moderated by the original CISO, Steve Katz. We can’t divulge what was discussed, but we can tell you there was a heated conversation about risk. At some point during the conversation, ... Read More

The College Admissions Scandal: Dethroning Privilege

The recent college admissions scandal making headlines is placing the spotlight on the inequitable treatment of children of privilege. Wealthy parents bribing college coaches and exam protectors to get their unqualified children into prestigious universities is reproachable. It has touched a chord that cannot be silenced. Insider Threat or Fraud? ... Read More

ABCs of UEBA: D is for Data

The most effective User and Entity Behavior Analytics (UEBA) solutions leverage big data. Big data refers to large and complex data sets that traditional data processing application software cannot process effectively because of volume, velocity and variety. This was documented as part of big data’s original definition by Gartner’s Doug ... Read More
Gurucul Risk Analytics

A Nut Worth Cracking

We talk to a number of market research firms and meet with a lot of analysts. On this particular day, we met with an analyst who had a colorful vocabulary. We were talking about our Behavior Based Security Analytics platform and where we could make ground-breaking strides. In reviewing some ... Read More

ABCs of UEBA: C is for Context

A man runs through the airport. Is he trying to catch a flight or fleeing from authorities? Context is key to understanding behavior. And, behavior is key to predicting risk. The biggest challenge that enterprises face today is the flood analysts deal with involving too many alerts with very little ... Read More

ABCs of UEBA: B is for Behavior

We like to say, “You can steal an identity, but you can’t steal behavior.” You might compromise my credentials, but you don’t know what time I normally login, the applications I typically use, the people I regularly email, etc. Behavior is the Leading Threat Indicator The key to predicting threats, ... Read More

You’re Paying Too Much for Your SIEM

Welcome to 2019! Have you made a New Year’s resolution? If there’s one resolution you should make and stick to in 2019, it’s to stop paying so much for your SIEM. Show SIEM the Money We talk to a lot of customers, prospects and industry analysts. A clear theme that ... Read More

ABCs of UEBA: A is for Analytics

Welcome to our new blog series: ABCs of UEBA. This is not a blog series for dummies. This is a view into what makes up UEBA from A to Z, from start to finish, thoroughly, and in detail. So, let’s get started! Analytics is the engine that fuels User and ... Read More

Detect Merchant Fraud with “Outlier Categorical Model”

It can’t be over yet! Or can it? Our final model in the #MachineLearningMadness blog series is up next and it’s a whopper! Gurucul Machine Learning Model: Outlier Categorical Model How does the Outlier Categorical Model machine learning model work, what does it do? This is a really powerful model ... Read More
Loading...