network-world

Time to Consider User Behavior Analytics (UBA)

Market demand somewhat muted by market confusion. In 2012, I did an extension research project on big data security analytics. My thesis was that big ...

cso_online

Cloud blurs personal and corporate identities

Breach of CIA director’s AOL account exposes latent attack surface When hackers posted online contact lists and other documents stolen from the AOL account of ...

voanews

WikiLeaks Posts CIA Director’s Personal Info

WASHINGTON— Information from the private email account of CIA Director John Brennan is being made public, just days after hackers bragged they had broken in. ...

cso_online

Why we need behavior-centric detection and response

Breach discovery can take days using traditional methods According to the Verizon 2015 Data Breach Investigations Report (DBIR), 60 percent of the time, attackers were ...

cso_online

Identity theft in the enterprise

It’s no longer just a consumer phenomenon Identity theft, historically considered a consumer threat, is expanding its horizons. Looking for bigger game, attackers are targeting ...

cso_online

What can we learn from JPMorgan’s insider breaches?

User behaviors can expose bad actors before it’s too late Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on ...

scmagazine_post

Product Review Gurucul Risk Analytics

There are several products that claim to do analytics and a few that claim to do predictive analytics, but this is the first we've seen ...

home_land_post

The Snowden Fallout: Two Years Later

Former National Security Agency (NSA) subcontractor Edward Snowden said recently he is willing to stand trial in the US for revealing classified information about NSA ...