UEBA
Empowering Employees to Reduce Security Incidents
In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security ...
Modern Database Security Buys Down More Risks for Enterprises
Pop quiz: how many data records are lost or stolen on an average day? 1 million? 3 million? 6 million? If you answered 6 million, you’re correct, according to the Breach Level ...
Taming Network Chaos By Understanding User Behavior
Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable ...
Brute Force Attacks: Denying the Attacker, Not the User
According to haveIbeenpwned.com, close to 8 billion accounts have been compromised. The site provides a tool to see if any of your passwords have been compromised and are available on the dark-net ...
ABCs of UEBA: F is for Fraud
Enterprise fraud management platforms have been around for years, but many legacy platforms lack the... The post ABCs of UEBA: F is for Fraud appeared first on Gurucul ...
ABCs of UEBA: E is for Entity
The “E” in UEBA stands for “Entity” – User and Entity Behavior Analytics. What do we mean by Entity? Traditional device entities in a typical enterprise include servers, desktops, laptops, tablets, printers, ...
Prying Eyes Inside the Enterprise: Bitglass’ Insider Threat Report
When words like cyberattack are used, they typically conjure up images of malicious, external threats. While hackers, malware, and other outside entities pose a risk to enterprise security, they are not the ...
ABCs of UEBA: D is for Data
The most effective User and Entity Behavior Analytics (UEBA) solutions leverage big data. Big data refers to large and complex data sets that traditional data processing application software cannot process effectively because ...
ABCs of UEBA: C is for Context
A man runs through the airport. Is he trying to catch a flight or fleeing from authorities? Context is key to understanding behavior. And, behavior is key to predicting risk. The biggest ...
ABCs of UEBA: B is for Behavior
We like to say, “You can steal an identity, but you can’t steal behavior.” You might compromise my credentials, but you don’t know what time I normally login, the applications I typically ...
