blog-why-sign-based

Why are IAMs struggling today?

Author: Nilesh Dherange, CTO, Gurucul      At Gurucul, we see customers facing a host of challenges, some more profound than others. One stands out ...

cso_online

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert www.csoonline.com | July 6, 2017 Machine learning has emerged as the ideal ...

darkreading

Why Compromised Identities Are IT’s Fault

Saryu Nayyar www.darkreading.com| June 8, 2017 The eternal battle between IT and security is the source of the problem. The compromise and misuse of identity credentials provides ...

cso_online

Beyond Risk Scoring

Unlocking its full potential requires closed-loop responses Leslie K. Lambert CSO | Feb 14, 2017 Risk scoring is not an end in itself once it shows ...

cso_online

Bridging the CIO and CISO Divide

Why identity and access management is at the core of the gulf between these two C-suite roles. Leslie K. Lambert CSO | Dec 7, 2016 ...

Gurucul-STUDIO-Datasheet

Gurucul STUDIO – Datasheet

Create custom machine learning models without coding and minimal knowledge of data science. Gurucul STUDIO provides a step-by-step graphical interface to select attributes, train models, ...