Syndicated Blog

RevealSecurity
Detecting Malicious Insiders and Imposters by Monitoring User Journeys in Enterprise Applications
Okta Breach Analysis  I   RevealSecurity

Microsoft Azure Security Breach Underscores the Need for Identity Threat Detection

| | ITDR
By Adam Koblentz Earlier this month, Proofpoint’s cloud security response team shared their analysis of an ongoing campaign against Microsoft Azure customers, targeting hundreds of employees across different customer environments, ranging from ...

Closing the Identity Threat Detection Gap: The Okta Support Unit Breach Revisited

| | insider threat, ITDR
Revisit what happened at Okta, what the impacts were to both Okta and its customers, and how a more sophisticated approach to identity threat detection may have led to a very different ...

Five Lessons from the Microsoft Identity Breach

Notable new developments from Microsoft’s identity breach and five lessons security teams can take from it. The post Five Lessons from the Microsoft Identity Breach appeared first on RevealSecurity ...
™

Why Microsoft’s Latest Breach is an Identity Threat Detection Wake-Up Call

Let’s take a closer look at what happened, why it matters, and what lessons the industry can apply in an effort to defend against identity-based threats more effectively. The post Why Microsoft’s ...

Enhancing Cybersecurity in Hyper-Regulated Industries: A Data-Driven Approach

| | insider threat, SOC, UEBA
“By thinking in a more sophisticated, analytical way about what constitutes good behavior and anomalous behavior, you get a much higher fidelity of alerts.” The post Enhancing Cybersecurity in Hyper-Regulated Industries: A ...

Cyber Observations from a CISO Village Elder

“By thinking in a more sophisticated, analytical way about what constitutes good behavior and anomalous behavior, you get a much higher fidelity of alerts.” The post Cyber Observations from a CISO Village ...
Defining insider risk

Insider Risk – Where do Enterprises Stand and Where are They Going?

“Identity is about establishing trust, while insider risk is what happens when the trust chain is broken. That trust chain might be someone to whom you have willingly given credentials or a ...
Should we care about the theft of one dollar?

Should we care about the theft of one dollar?

By deploying user journey analytics, the insurance company would have seen instances of anomalous behavior for the employee crediting $1 to their account. The post Should we care about the theft of ...
Are Malicious Insiders Lurking on ServiceNow Instances?

Are Malicious Insiders Lurking on ServiceNow Instances?

| | applications, ServiceNow
ServiceNow provides a cloud platform for organizations to manage both internal and external IT operations. With a market share north of 50 percent, ServiceNow is one of the most popular IT service ...