standing_out

Security by the People

How self-audits expose threats only users can detect Leslie K. Lambert CSO | Aug 8, 2016 Sometimes it takes a village. In the case of information ...

CRN

The 10 Coolest Security Startups Of 2016 (So Far)

Saryu Nayyar www.crn.com| July 5, 2016 Gurucul is planting a stake in the growing market for security risk and user behavior analytics. The Los Angeles-based company -- ...

darkreading

The Blind Spot Between The Cloud & The Data Center

Ask most enterprise security analysts responsible for detection and response about their visibility into identity access risks and you're likely to get some confused looks. ...

cyberspy

Detecting low and slow insider threats

Machine learning offers new ways to ID abuse by trusted users Leslie K. Lambert CSO | May 30, 2016 In my last post I discussed how ...

cso_online

Machine Learning and Social Engineering Attacks

Can analytics prevent IP theft after a successful account compromise? Leslie K. Lambert CSO | April 21, 2016 In my last post I promised to use ...

cso_online

Machine Learning is Reshaping Security

Maybe, but what the heck is it anyway? Leslie K. Lambert CSO | March 15, 2016 At the recent RSA Conference it was virtually impossible to ...

network-world

Time to Consider User Behavior Analytics (UBA)

Market demand somewhat muted by market confusion. In 2012, I did an extension research project on big data security analytics. My thesis was that big ...

cso_online

Cloud blurs personal and corporate identities

Breach of CIA director’s AOL account exposes latent attack surface When hackers posted online contact lists and other documents stolen from the AOL account of ...