Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable ...

ABCs of UEBA: E is for Entity

The “E” in UEBA stands for “Entity” – User and Entity Behavior Analytics. What do we mean by Entity? Traditional device entities in a typical enterprise include servers, desktops, laptops, tablets, printers, ...

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing ...

ABCs of UEBA: C is for Context

A man runs through the airport. Is he trying to catch a flight or fleeing from authorities? Context is key to understanding behavior. And, behavior is key to predicting risk. The biggest ...

ABCs of UEBA: B is for Behavior

We like to say, “You can steal an identity, but you can’t steal behavior.” You might compromise my credentials, but you don’t know what time I normally login, the applications I typically ...

Going on the Offense: How to Eliminate Internal Threats

Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used to be discussions about how to keep bad guys out has evolved ...

UEBA and Evolved SIEM ? Foundations of the Intelligent SOC

Using the analogy of a driverless vehicle, the role of UEBA in your security platform is explored. Find out how analytics based on patterns and unusual behavior help security analysts target threats, ...

Detection Only Solutions Aren’t Enough For Today’s Security Teams

Last week I had the opportunity to speak with several CISOs about what they are doing to deal with cyberattacks, breaches and internal threats. A consistent theme I heard is that detection ...
developers

Data Loss Prevention Needs a Little Help from Its Friends

I recently read an article on Security Boulevard discussing how to get the most out of data loss prevention (DLP) technology. While much of the byline I agree with, especially the three ...