cso_online

Bridging the CIO and CISO Divide

Why identity and access management is at the core of the gulf between these two C-suite roles. Leslie K. Lambert CSO | Dec 7, 2016 ...

17+ Female Founders & CEOs in Cybersecurity

IN CELEBRATION OF WOMEN’S ENTREPRENEURSHIP DAY NOVEMBER 19 itspmagazine.com – Nov. 19, 2016 – On November 19, 2014, the inaugural Women’s Entrepreneurship Day (WED) was held ...

Open Gate Access

Pain in the PAM

Why privileged access management poses unique challenges Leslie K. Lambert CSO | Oct 11, 2016 In order to prevent security breaches, insider attacks and comply with ...

american-logo

Gurucul Risk Analytics in AST Homeland Security Awards (Video)

Tammy Waitt Aug 30, 2016 Can You Spot an Insider? Gurucul is changing the way government entities and enterprises protect themselves against insider threats, account ...

code_hack

How data science fights modern insider threats

Ben Dickson Aug 25, 2016 Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security ...

standing_out

Security by the People

How self-audits expose threats only users can detect Leslie K. Lambert CSO | Aug 8, 2016 Sometimes it takes a village. In the case of information ...

CRN

The 10 Coolest Security Startups Of 2016 (So Far)

Saryu Nayyar www.crn.com| July 5, 2016 Gurucul is planting a stake in the growing market for security risk and user behavior analytics. The Los Angeles-based company -- ...

darkreading

The Blind Spot Between The Cloud & The Data Center

Ask most enterprise security analysts responsible for detection and response about their visibility into identity access risks and you're likely to get some confused looks. ...

cyberspy

Detecting low and slow insider threats

Machine learning offers new ways to ID abuse by trusted users Leslie K. Lambert CSO | May 30, 2016 In my last post I discussed how ...