Security Analytics

Analytics and Intelligence

Clarifying the Misconceptions: Monitoring and Auditing for Container Security

An effective container security strategy consists of many parts. Organizations should first secure the build environment using secure code control along with build tools and controllers. Next, they should secure the contents ...

Stop Fileless Malware with “Abnormal PowerShell Command Execution”

Gurucul’s #MachineLearningMadness blog series continues to deliver details on our most popular machine leaning models. Next up is a critical model for Windows environments. Gurucul Machine Learning Model: Abnormal PowerShell Command Execution ...

Does AI solve it all?

Artificial Intelligence and Machine Learning hold a lot of promises in security. They will help us address the problems around false positives and detecting anomalies. There is a lot of hope and ...
FUD to Prevent the Security Breach

Forgo the FUD to Prevent the Security Breach

How fear, uncertainty and doubt feed the false belief that security breaches can’t be avoided Coming off the heels of the Facebook breach news, it might sound downright crazy to suggest that ...
Security Boulevard
Fileless Malware Rapid Expansion

APT28 Gets the Spotlight, But Turla Remains Russia’s Elite Hacking Unit

Over the past two years, the Russian cyberespionage group known as APT28, Sofacy or Fancy Bear, has been the focus of many press reports, threat analyses, Western intelligence investigations and, more recently, ...
Security Boulevard
Employee Hacks: Spotting Insider Threats

Employee Hacks: Spotting Insider Threats

Organizations face security threats such as data breaches from numerous sources, however many only consider attacks from external sources. However, 60 percent of attacks are the result of trusted insiders with access ...
Security Boulevard
Top SIEM Use Case Examples

Top SIEM Use Case Examples

| | SIEM
Recent research indicates that up to 70 or 80% of SIEM deployments are driven by PCI DSS or other regulations. The following table shows a few example regulations that affect SIEM and ...
AI Can Help Close Security Gaps

Ponemon Study Finds AI Can Help Close Security Gaps

Is the tail wagging the dog? Ponemon Institute and Aruba teamed up on a survey released a few weeks ago that found artificial intelligence (AI) is the key weapon for closing IoT-era ...
Security Boulevard

Identify Outlier Access with “Clustering and K-Means”

It’s the gift that keeps on giving! Gurucul’s #MachineLearningMadness sessions at Black Hat USA 2018. We continue to roll out the details of the Machine Learning Models that Gurucul Risk Analytics uses ...

Survey: 44% of Security Professionals Spend More than 20 Hours a Week Responding to Alerts

As the global cybersecurity climate continues to heat up, so too do the subsequent levels of alert fatigue IT security professionals have to deal with. A recent survey by Imperva reveals that ...
Loading...