cyberthreat-defense-report

Cyberthreat Defense Report (CDR) 2016 Highlights

Tom Clare VP of Marketing at Gurucul Feb 18, 2016 CyberEdge recently released the 2016 version of the Cyberthreat Defense Report (CDR) and new in ...

Identity

Identity – Dictionary.com’s 2015 Word of the Year

Tom Clare VP of Marketing at Gurucul Dec 13, 2015 Identity is the "2015 Word of the Year" based on Dictionary.com analysis of the most ...

Machine Learning

Learning some Machine Learning (while learning from it…)

Nir Yosha Solutions Architect at Gurucul Nov 13, 2015 Machine learning is ingrained in our day-to-day life. It is part of our spam filters mechanism, ...

Highlights from FS-ISAC (Fall 2015) San Diego, CA

Highlights from FS-ISAC (Fall 2015) San Diego, CA

If you missed out on FS-ISAC this week, below is an elevator ride summary of key security points. Sorry, unable to pass on the 80-degree ...

User Behavior Analytics

Where can I find more about User Behavior Analytics?

Ankur Chadda Product Marketing @Ankur_Chadda Oct 28, 2015 When I talk to friends and colleagues about user behavior analytics there are some people who know about ...

User-behavior-and-inside-threat-detection

User behavior and inside threat detection

Nir Yosha Solutions Architect at Gurucul Question: What is the most common cause for data breaches? Answer: Weak and stolen credentials. About 76% of network ...

Benefits-of-Insider-Threat

The Benefits of an Insider Threat Detection Program

With the rapid increase in cyber-crime, it is imperative for businesses to invest more in security to protect vital organizational data and assets. While it ...

healthcare

Do you think all healthcare insurers are safe?

New Hack, Same Old Story The news of the Anthem breach has hit every major media outlet in record time. The story line is the ...