voanews

WikiLeaks Posts CIA Director’s Personal Info

WASHINGTON— Information from the private email account of CIA Director John Brennan is being made public, just days after hackers bragged they had broken in. ...

cso_online

Why we need behavior-centric detection and response

Breach discovery can take days using traditional methods According to the Verizon 2015 Data Breach Investigations Report (DBIR), 60 percent of the time, attackers were ...

cso_online

Identity theft in the enterprise

It’s no longer just a consumer phenomenon Identity theft, historically considered a consumer threat, is expanding its horizons. Looking for bigger game, attackers are targeting ...

cso_online

What can we learn from JPMorgan’s insider breaches?

User behaviors can expose bad actors before it’s too late Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on ...

scmagazine_post

Product Review Gurucul Risk Analytics

There are several products that claim to do analytics and a few that claim to do predictive analytics, but this is the first we've seen ...

home_land_post

The Snowden Fallout: Two Years Later

Former National Security Agency (NSA) subcontractor Edward Snowden said recently he is willing to stand trial in the US for revealing classified information about NSA ...

nework_world_post

Behavioral analytics vs. the rogue insider

The promise of User Behavioral Analytics is that it can go beyond simply detecting insider threats to predicting them. Some experts say that creates a ...

cso_online

Identity as an attack surface

Instead of targeting networks and applications, more and more bad actors are exploiting identities Thanks to mobile computing, cloud apps and tele-working, the de-perimeterization of ...

nework_world_post

Gurucul identifies cloud threats based on identity, behaviors

Identity-based threat detection can spot threats from within and without Gurucul is extending its identity-based threat detection to cloud-based applications with a new platform that ...

cso_online

Detecting advanced threats with user behavior analytics

Using big data and machine learning to assess the risk, in near-real time, of user activity Day after day, an employee uses legitimate credentials to ...