Insider Threat Use Case | Swimlane Low-Code Security Automation

Your Security Guide to Insider Threats: Detection, Best Practices, Solutions

Detecting and proactively preventing external cyberattacks is a focus for security operations (SecOps) teams, but insider attacks also pose a risk. In fact, nearly 75% of data breaches are caused by insider ...
Insider Threat Use Case | Swimlane Low-Code Security Automation

Your Security Guide to Insider Threats: Detection, Best Practices, Solutions

Detecting and proactively preventing external cyberattacks is a focus for security operations (SecOps) teams, but insider attacks also pose a risk. In fact, nearly 75% of data breaches are caused by insider ...
Anomaly Detection at Scale Using SQL and Facebook’s Prophet Forecasting Algorithm

Anomaly Detection at Scale Using SQL and Facebook’s Prophet Forecasting Algorithm

Anomaly detection is a very important task. At Imperva we use it for threat hunting, risk analysis, risk mitigation, trends detection and more. In a previous post we showed how it can ...

Why Insisting on Complicated Passwords can be a Dangerous Security Practice

According to the Forester Insider Threat report, commissioned by Imperva in 2021, 50% of the companies surveyed plan to increase security awareness among their employees over the next 12 months. Many are ...

What Does an Internal Attack Resulting in a Data Breach Look Like in Today’s Threat Landscape?

In my last blog, I explained why taking the approach of setting up perimeter defenses, restricting data access, patching vulnerabilities, applying sensors to data movement, and encrypting data is no longer solely ...
Download Now

Insider Threat Survey Report: RSA 2019

At the 2019 RSA Conference, Gurucul conducted an Insider Threat Survey. We wanted to get a sense for just how prevalent the Insider Threat is in the minds of the practitioners. 671 ...

ABCs of UEBA: B is for Behavior

We like to say, “You can steal an identity, but you can’t steal behavior.” You might compromise my credentials, but you don’t know what time I normally login, the applications I typically ...

Secure Guardrails