Prevent Fraud with “Rare and Volume Based Analytics”

We are pleased to provide details on our most popular machine learning models. Check out the next in our series of informative blog articles. Gurucul Machine Learning Model: Rare and Volume Based ...

Network Anomaly Detection Track Record in Real Life?

As I allude here, my long-held impression is that no true anomaly-based network IDS (NIDS) has ever been successful commercially and/or operationally. There were some bits of success, to be sure (“OMG ...
Language Matters Data Breach

Five Eyes Cybersecurity Agencies Release Report on Hacking Tools

The national cybersecurity agencies of the United States, U.K., Canada, Australia and New Zealand, known in the intelligence world as the Five Eyes, have released a joint report on five publicly available ...
Security Boulevard

Clarifying the Misconceptions: Monitoring and Auditing for Container Security

An effective container security strategy consists of many parts. Organizations should first secure the build environment using secure code control along with build tools and controllers. Next, they should secure the contents ...

Stop Fileless Malware with “Abnormal PowerShell Command Execution”

Gurucul’s #MachineLearningMadness blog series continues to deliver details on our most popular machine leaning models. Next up is a critical model for Windows environments. Gurucul Machine Learning Model: Abnormal PowerShell Command Execution ...

Does AI solve it all?

Artificial Intelligence and Machine Learning hold a lot of promises in security. They will help us address the problems around false positives and detecting anomalies. There is a lot of hope and ...
FUD to Prevent the Security Breach

Forgo the FUD to Prevent the Security Breach

How fear, uncertainty and doubt feed the false belief that security breaches can’t be avoided Coming off the heels of the Facebook breach news, it might sound downright crazy to suggest that ...
Security Boulevard
Fileless Malware Rapid Expansion

APT28 Gets the Spotlight, But Turla Remains Russia’s Elite Hacking Unit

Over the past two years, the Russian cyberespionage group known as APT28, Sofacy or Fancy Bear, has been the focus of many press reports, threat analyses, Western intelligence investigations and, more recently, ...
Security Boulevard
Employee Hacks: Spotting Insider Threats

Employee Hacks: Spotting Insider Threats

Organizations face security threats such as data breaches from numerous sources, however many only consider attacks from external sources. However, 60 percent of attacks are the result of trusted insiders with access ...
Security Boulevard
Top SIEM Use Case Examples

Top SIEM Use Case Examples

| | SIEM
Recent research indicates that up to 70 or 80% of SIEM deployments are driven by PCI DSS or other regulations. The following table shows a few example regulations that affect SIEM and ...
Loading...