2020 was not like most of us imagined it would have been. With Covid-19 came various new challenges in the cybersecurity world, like securing the remote workforce and managing access with most of the workforce working remotely. These were some of the new challenges for SOC teams.
At Gurucul, we covered all of these problems and their solutions in our blog posts, but as always some of our blogs were liked more than others. Here are our top 10 most-read blog posts of the year as measured by pageviews.
10. Coronavirus Accelerates Need to Secure Remote Workers
With the increase in coronavirus (COVID-19) cases, more companies asked their employees to work remotely. Unfortunately, the speed at which IT security teams were faced with having to support remote workers proved to be challenging not only because of the limitations of their current infrastructures, but also due to new cyber threats specifically related to the Coronavirus. In this blog post, we discussed a solution to this problem.
9. A New Security Model for Remote Workers
Remote work become more common around the world as companies and employees discovered the many benefits of teleworking. However, remote work introduced new security challenges for IT security teams that traditionally focused on managing risk within the confines of a traditional office environment. Read this blog post to understand how to apply a model for remote workers to keep your cybersecurity intact.
8. Top 10 Tips to Prevent Insider Threats
September was National Insider Threat Awareness Month (NIATM), to emphasize the importance of detecting, deterring, and reporting insider threats. In honor of National Insider Threat Awareness Month, we did a blog post discussing the Top 10 Tips to Prevent Insider Threats.
7. Insider Threats are on the Rise
The global pandemic has seen an exponential growth of cyberattacks targeting remote workers. This has dramatically impacted organizations worldwide as they struggle to maintain a secure working environment. We have seen a dramatic increase in insider threats across the board, including malicious employees, accidental negligence, third party contractor or vendor misuse, and account compromise attacks. Read this blog post to understand the rise of insider threats and an answer to the problem.
6. ABCs of UEBA: P is for PRIVILEGE
Privileged accounts are targeted by cyber criminals because they provide the keys to the kingdom – literally. Attackers need privilege to gain access to systems with sensitive data, install malware, exfiltrate data, and take control of systems and devices. Getting privileged access is the entire point of corporate hacking attempts. Thus, In this blog post, we understand where privileged accounts are, how to restrict these privileges, and how to monitor access to them.
5. Leveraging Machine Learning for Cross-Channel Fraud Detection
Financial fraud occurs every day, accumulating in trillions of dollars in losses each year. In some segments, fraud has reached the highest levels on record. It affects more organizations than ever across all industries. A survey by PwC revealed that 49% of businesses experienced fraud over the previous two years. In this blog post, we discussed how Gurucul fraud analytics leverages machine learning for cross-channel fraud detection.
4. A Security Evolution: Taking Security Beyond SIEM with Behavior Analytics
What makes Gurucul stand out among the many security analytics vendors? Well, for starters, Gurucul’s behavior-based predictive security analytics takes security beyond SIEM. Read this blog post to learn how Gurucul is leading an evolution from black box analytics to machine learning and risk scores.
3. Applying Behavior Analytics to the MITRE ATT&CK Framework
Today’s organizations are besieged by more than 350,000 new malware programs every day. Meanwhile, 99% of malware is seen only once before it’s modified and used again. How can today’s cyber defense teams keep pace with such unrelenting attacks? The answer for more and more organizations is the MITRE ATT&CK™ (Adversarial Tactics, Techniques, and Common Knowledge) Framework. In this blog post, we discuss the benefits of applying behavior analytics to the MITRE ATT&CK framework.
2. Behavior is the Leading Threat Indicator
If there is one sure thing in life, it’s that behavior never lies. Your behavior defines you just as it defines others. In the world of cybersecurity, criminals may steal an identity, but they can’t steal the behavior associated with that individual (or device). Attackers may compromise someone’s credentials, but they cannot mimic that user’s behavior. Thus in this blog post, we see how behavior is the leading threat indicator.
1. 2020 US Election Security is Paramount
The 2020 election season was a Big Deal™ as it should have been. Protecting the process and making sure the Vote was fair, secure, and timely, was vital to American Democracy. In this blog post, we discussed the challenges the election process would have faced and possible solutions.
Happy new year and thanks for reading the Gurucul blog!