User Behavior

Data Security: Beyond Threat Hunting to Monitoring Data Flow and User Behavior
Katie McCullough | | behavior analytics, Cybersecurity, Data Security, insider threat, Threat Hunting, User Behavior, user experience
Cybersecurity is moving from conventional threat detection to a strategy that emphasizes context and preempts user behavior to detect anomalies ...
Security Boulevard
Reducing Investigation Time: How to Quickly Parse True Positives
Eran Cohen | | Adaptive Response, Adaptive Threat Prevention, Conditional Access, Identity Verification, Incident Response, insider threat, Threat Mitigation, User Behavior
In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for ...
Disrupting an Attacker from Exploiting Domain Credentials
Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have found that top threat actors can go in and out of networks ...
Conditional Access Establishes Trust In the Network
Heather Howland | | APT, Compliance, Credential Compromise, Multi-Factor Authentication, Privileged Accounts, risk, user and entity behavior analytics, User Behavior
Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing ...

74% of Americans Are Clueless about Facebook’s Data Collection Algorithm, Survey Says
Luana Pascu | | Data Privacy, Industry News, Social networks, targeted ads, User Behavior, user data
Americans don’t know much about Facebook and how its algorithm works, according to a survey from Pew Research Center conducted on 963 US Facebook users. The new study found that 74 percent ...
Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam
Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la! 'Tis the season to be swindled, Fa, la, la, la, la, la, la, la, la! ...
Going on the Offense: How to Eliminate Internal Threats
Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used to be discussions about how to keep bad guys out has evolved ...