Blog_(Security-Gaps-in-Access-Management)

Security Gaps in Access Management

Author: Craig Kensek Sr. Product Marketing Manager, Gurucul March 15, 2017 One critical question security leaders are contending with in today’s emerging environments is, “how do ...

Predictive-Security-Analytics-Use-Cases

Predictive Security Analytics Use Cases

Author: Nilesh Dherange, CTO, Gurucul      The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics - identity analytics) ...

BBA-Blog1-Image-(800x400)

The Vanishing Security Perimeter

Ankur Chadda Product Marketing @Ankur_Chadda Feb 9, 2017 The security perimeter has faded. Old defenses for environments can no longer be relied upon to ensure ...

Risky Science

Risky Science of Risk Assessment

Aruna Rajasekhar and Pete Gajria, Data Scientists Dec 8, 2016 Data is the currency of the digital age. It is the foundation for analytics. The ...