Blog_(Security-Gaps-in-Access-Management)

Security Gaps in Access Management

Author: Craig Kensek Sr. Product Marketing Manager, Gurucul March 15, 2017 One critical question security leaders are contending with in today’s emerging environments is, “how do ...

Predictive-Security-Analytics-Use-Cases

Predictive Security Analytics Use Cases

Author: Nilesh Dherange, CTO, Gurucul      The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics - identity analytics) ...

BBA-Blog2-Image-800x400

What is the Threat Surface Equation?

Author: Tom Clare VP Marketing, Gurucul Feb 24, 2017 We all grew up with Einstein’s E = mc 2. The equation is a staple for scientific ...

BBA-Blog1-Image-(800x400)

The Vanishing Security Perimeter

Ankur Chadda Product Marketing @Ankur_Chadda Feb 9, 2017 The security perimeter has faded. Old defenses for environments can no longer be relied upon to ensure ...

Blog-Join-Gurucul-at-RSA

Join Gurucul (#2407) at RSA in San Francisco this February

Craig D. Kensek Senior Product Marketing Manager Visit us at RSA Conference 2017, ‘Where the world talks security’.  RSA is one of the industry’s largest ...

Risky Science

Risky Science of Risk Assessment

Aruna Rajasekhar and Pete Gajria, Data Scientists Dec 8, 2016 Data is the currency of the digital age. It is the foundation for analytics. The ...

blog_thumb-nsa-contractor

NSA Contractor Suspected for Stealing Classified Data

Beau Hutto, VP Federal Oct 19, 2016 Harold Thomas Martin may have stolen NSA classified data five months after Edward Snowden left his contractor position ...

mission-critical

Mission Critical Security Risk Analytics Needs in Federal Agencies

Author Jason Ohs Director, Federal Systems Engineering Sep 28, 2016 There are marked differences in Federal and Commercial spaces. Some are characterized by organizational mandates, motivations ...