FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

Blog_(Security-Gaps-in-Access-Management)

Security Gaps in Access Management

Author: Craig Kensek Sr. Product Marketing Manager, Gurucul March 15, 2017 One critical question security leaders are contending with in today’s emerging environments is, “how do ...

Predictive-Security-Analytics-Use-Cases

Predictive Security Analytics Use Cases

Author: Nilesh Dherange, CTO, Gurucul      The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics - identity analytics) ...

darkreading

Why Identity Has Become A Top Concern For CSOs

Saryu Nayyar www.darkreading.com| Feb 21, 2017 Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the ...

cso_online

Beyond Risk Scoring

Unlocking its full potential requires closed-loop responses Leslie K. Lambert CSO | Feb 14, 2017 Risk scoring is not an end in itself once it shows ...