How Do You Establish Credibility?

How Do You Establish Credibility?

Earlier this month, we met with our Executive Advisory Board. These are seasoned Chief Information Security Officers commanding enterprise security teams in various industries. In ...

Workflow Classification Regression Tree

Dynamic Provisioning: “Workflow Classification Regression Tree”

Gurucul Machine Learning Model: Workflow with Classification Regression Tree How does the Workflow with Classification Regression Tree machine learning model work, what does it do?  ...

Predictive Flight Risk

Pinpoint Departing Users with “Predictive Flight Risk”

At Black Hat USA this year, Gurucul shared details of our most popular Machine Learning Models. Read on to learn about the second model we ...

Security Analytics is not a SIEM

Security Analytics is not a SIEM

A lot of analysts in our space are saying that security analytics products are second generation SIEMs. We disagree. A Security Analytics product can do ...

Email Fuzzy Logic

Detect Insider Threats with “Email Fuzzy Logic”

At Black Hat USA this year, Gurucul shared details of our most popular Machine Learning Models. Every hour at Black Hat we revealed a new ...

Blog Insider Threats Q&A

A Q&A With Our CEO About Insider Threats

Saryu Nayyar, our CEO, was contacted by a reporter to provide comments on an Insider Threat story. The reporter sent Ms. Nayyar a list of ...

Machine Learning Madness

Machine Learning Madness at Black Hat USA!

Gurucul will share details of our most popular Machine Learning Models at Black Hat this year. #MachineLearningMadness How do we detect insider threats and stop ...