ABCs of UEBA: R is for Risk

Risk identification and prioritization is at the heart of an advanced User and Entity Behavior... The post ABCs of UEBA: R is for Risk appeared first on Gurucul ...
Sumo Logic

Sumo Logic Finds Attack Surface Expanding

An annual report published today by Sumo Logic, a provider of security tools delivered as a cloud service, highlights the degree to which security has fundamentally shifted in the age of the ...
Security Boulevard
Chinese

Japanese Orgs Hacked ‘by China’ in Long, Widespread Campaign

Chinese state-backed threat actors APT10 have been hacking Japanese businesses for at least a year ...
Security Boulevard

Why SIEMs need threat intelligence to defeat Cyberthreats

Security professionals the world over crave compliance management and the ability to pull deep insights from their complex IT environments. This need was the catalyst for the initial adoption of security information ...
™

Insider Threat Case Studies: Why You Need Advanced Behavior Analytics

We’ve talked a lot about Insider Threats.  They are a Big Deal™ and deserve the... The post Insider Threat Case Studies: Why You Need Advanced Behavior Analytics appeared first on Gurucul ...
5 user behavioral patterns to look out for in a decentralized workspace

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a ...

Featured Use Case: Why a Large Government Entity Replaced Their SIEM with MixMode

| | Blog, SIEM, SOC, Third Wave AI, UBA, use case
Despite a three-year SIEM deployment and a two-year UBA deployment, government personnel needed an alternative to better detect and manage threats in real-time, as well as an improved platform for gathering comprehensive ...
Thundra Logo Z

Frictionless Instrumentation with Lambda Layers

In many ways, serverless functions, like auto-scaling, pay-per-use, and reduced complexity, are great. When things go wrong and developers have a problem with their serverless architecture, they’re likely to check Amazon CloudWatch ...
Sandworm

3 Takeaways from Sandworm Hacker Group’s Indictment 

The U.S.Department of Justice officially revealed in October what it said were a number of instances of Russian government-sponsored hacking when it formally indicated six members and officers in Russia’s military agency ...
Security Boulevard
survey security

Survey Sees AI, Automation Cast Shadow Over Security Careers

| | AI, Automation, Careers, survey
A survey of 350 security professionals in the U.S., Singapore, Germany, Australia and the United Kingdom suggests younger cybersecurity professionals tend to be more conflicted about advances in artificial intelligence (AI) than ...
Security Boulevard