Flying Blind: Is your Vulnerability Management program working?

Vulnerability management is a non-trivial problem for any organization that is trying to keep their environment safe.  There can be myriad tools in use, multiple processes, regulations, and numerous stakeholders all putting demands on the program.  All of these factors can combine to make it difficult to see how effective ... Read More

Drowning in Vulnerabilities: The Hidden Costs of Poor Risk Prioritization

Starting with Vulnerabilities Modern vulnerability management programs combine multiple tools in multiple layers, such as asset management, vulnerability scanners, and patch management systems, to help an organization deal with vulnerabilities in its environment. Whether by proactively deploying patches or updates to remediate affected software or by putting compensating controls in ... Read More

ABCs of UEBA: U is for User

If you ask penetration testers what the easiest path into a target is, the chances... The post ABCs of UEBA: U is for User appeared first on Gurucul ... Read More

ABCs of UEBA: T is for Time

You may have thought that T would be for Threat and not Time in this... The post ABCs of UEBA: T is for Time appeared first on Gurucul ... Read More
Register Now Button

AI-Based Predictive Threat Hunting

Cybersecurity is often seen as a reactive endeavor.  We are responding to incidents after the... The post AI-Based Predictive Threat Hunting appeared first on Gurucul ... Read More
â„¢

Best Practices for Retiring your Legacy Kit

Recently a handful of companies reported being bitten by the Accellion bug.  That’s the one... The post Best Practices for Retiring your Legacy Kit appeared first on Gurucul ... Read More
Register Now Button

Context is King: Real World Examples on Preventing Data Breaches

| | Blog, security operations, SIEM
In general, SIEM’s are great at consolidating, presenting, and managing telemetry from the entire security... The post Context is King: Real World Examples on Preventing Data Breaches appeared first on Gurucul ... Read More

Go Phish

Working in the cybersecurity industry for a couple of decades, as a practitioner, researcher, penetration... The post Go Phish appeared first on Gurucul ... Read More

ABCs of UEBA: S is for Sabotage

Sabotage is the worst type of cyberattack. Stealing data is one thing, and it’s a... The post ABCs of UEBA: S is for Sabotage appeared first on Gurucul ... Read More
Register Now Button

Using Data to Fuel Transformation Across the Business

Data.  Data is at the heart of Security Analytics.  Lots of Data.  And data fuels... The post Using Data to Fuel Transformation Across the Business appeared first on Gurucul ... Read More
Loading...