RevealSecurity
Detecting Malicious Insiders and Imposters by Monitoring User Journeys in Enterprise Applications
Microsoft Azure Security Breach Underscores the Need for Identity Threat Detection
By Adam Koblentz Earlier this month, Proofpoint’s cloud security response team shared their analysis of an ongoing campaign against Microsoft Azure customers, targeting hundreds of employees across different customer environments, ranging from ...
Closing the Identity Threat Detection Gap: The Okta Support Unit Breach Revisited
Revisit what happened at Okta, what the impacts were to both Okta and its customers, and how a more sophisticated approach to identity threat detection may have led to a very different ...
Five Lessons from the Microsoft Identity Breach
Notable new developments from Microsoft’s identity breach and five lessons security teams can take from it. The post Five Lessons from the Microsoft Identity Breach appeared first on RevealSecurity ...
Why Microsoft’s Latest Breach is an Identity Threat Detection Wake-Up Call
Let’s take a closer look at what happened, why it matters, and what lessons the industry can apply in an effort to defend against identity-based threats more effectively. The post Why Microsoft’s ...
Enhancing Cybersecurity in Hyper-Regulated Industries: A Data-Driven Approach
“By thinking in a more sophisticated, analytical way about what constitutes good behavior and anomalous behavior, you get a much higher fidelity of alerts.” The post Enhancing Cybersecurity in Hyper-Regulated Industries: A ...
Cyber Observations from a CISO Village Elder
“By thinking in a more sophisticated, analytical way about what constitutes good behavior and anomalous behavior, you get a much higher fidelity of alerts.” The post Cyber Observations from a CISO Village ...
Insider Risk – Where do Enterprises Stand and Where are They Going?
“Identity is about establishing trust, while insider risk is what happens when the trust chain is broken. That trust chain might be someone to whom you have willingly given credentials or a ...
Should we care about the theft of one dollar?
By deploying user journey analytics, the insurance company would have seen instances of anomalous behavior for the employee crediting $1 to their account. The post Should we care about the theft of ...
Are Malicious Insiders Lurking on ServiceNow Instances?
ServiceNow provides a cloud platform for organizations to manage both internal and external IT operations. With a market share north of 50 percent, ServiceNow is one of the most popular IT service ...