User Behavior Analytics

Where can I find more about User Behavior Analytics?

When we talk to friends and colleagues about user behavior analytics there are some people who know about this topic but many who don’t. After ...

User behavior and inside threat detection

Question: What is the most common cause for data breaches? Answer: Weak and stolen credentials. About 76% of network intrusions involved weak credentials, according to ...

The Benefits of an Insider Threat Detection Program

With the rapid increase in cyber-crime, it is imperative for businesses to invest more in security to protect vital organizational data and assets. While it ...

Do you think all healthcare insurers are safe?

New Hack, Same Old Story The news of the Anthem breach has hit every major media outlet in record time. The story line is the ...

your organization should be concerned about malicious insider threat

Insider Threat

We've heard varying stories from our customers of how they focus on preventing and detecting Insider Threats in their environment. For some, especially those in ...

nervous system

Getting Started with Predictive Security Analytics

The amount of digital fraud and cybercrime taking place is increasing rapidly. The combination of a wide variety of different payment methods and an increasing ...

What your SIEM isn’t Telling you – Discover Risk Analytics

Security information and event management (SIEM), the system which provides real-time analysis of security alerts generated by network hardware and applications, has been a solid ...