Different Insider Threat Personas and How To Detect Them

This month we were a sponsor and exhibitor at the Gartner Security and Risk Management... The post Different Insider Threat Personas and How To Detect Them appeared first on Gurucul ...
Download Now

Insider Threat Survey Report: RSA 2019

At the 2019 RSA Conference, Gurucul conducted an Insider Threat Survey. We wanted to get a sense for just how prevalent the Insider Threat is in the minds of the practitioners. 671 ...
Download Now

Insider Threat Survey Report: RSA 2019

At the 2019 RSA Conference, Gurucul conducted an Insider Threat Survey. We wanted to get a sense for just how prevalent the Insider Threat is in the minds of the practitioners. 671 ...

ABCs of UEBA: B is for Behavior

We like to say, “You can steal an identity, but you can’t steal behavior.” You might compromise my credentials, but you don’t know what time I normally login, the applications I typically ...

Detect Insider Threats with “Email Fuzzy Logic”

At Black Hat USA this year, Gurucul shared details of our most popular Machine Learning Models. Every hour at Black Hat we revealed a new Machine Learning Model. It was fun. It ...

Improving insider threat detection

Detecting and proactively preventing external cyberattacks is a focus for security operations (SecOps) teams, but insider attacks also pose a risk. In fact, nearly 75% of data breaches are caused byinsider threats ...