Flying Blind: Is your Vulnerability Management program working?
Vulnerability management is a non-trivial problem for any organization that is trying to keep their environment safe. There can be myriad tools in use, multiple processes, regulations, and numerous stakeholders all putting demands on the program. All of these factors can combine to make it difficult to see how effective ... Read More
Drowning in Vulnerabilities: The Hidden Costs of Poor Risk Prioritization
Starting with Vulnerabilities Modern vulnerability management programs combine multiple tools in multiple layers, such as asset management, vulnerability scanners, and patch management systems, to help an organization deal with vulnerabilities in its environment. Whether by proactively deploying patches or updates to remediate affected software or by putting compensating controls in ... Read More
ABCs of UEBA: U is for User
If you ask penetration testers what the easiest path into a target is, the chances... The post ABCs of UEBA: U is for User appeared first on Gurucul ... Read More
ABCs of UEBA: T is for Time
You may have thought that T would be for Threat and not Time in this... The post ABCs of UEBA: T is for Time appeared first on Gurucul ... Read More

AI-Based Predictive Threat Hunting
Cybersecurity is often seen as a reactive endeavor. We are responding to incidents after the... The post AI-Based Predictive Threat Hunting appeared first on Gurucul ... Read More

Best Practices for Retiring your Legacy Kit
Recently a handful of companies reported being bitten by the Accellion bug. That’s the one... The post Best Practices for Retiring your Legacy Kit appeared first on Gurucul ... Read More

Context is King: Real World Examples on Preventing Data Breaches
In general, SIEM’s are great at consolidating, presenting, and managing telemetry from the entire security... The post Context is King: Real World Examples on Preventing Data Breaches appeared first on Gurucul ... Read More
ABCs of UEBA: S is for Sabotage
Sabotage is the worst type of cyberattack. Stealing data is one thing, and it’s a... The post ABCs of UEBA: S is for Sabotage appeared first on Gurucul ... Read More

Using Data to Fuel Transformation Across the Business
Data. Data is at the heart of Security Analytics.  Lots of Data.  And data fuels... The post Using Data to Fuel Transformation Across the Business appeared first on Gurucul ... Read More