BlogImg-Old-Versus-the-New-Strategies-in-Security-Solution-Adoption

Old Versus the New Strategies in Security Solution Adoption

In “Borderless Behavior Analytics – Who’s Inside? What’re They Doing?”, Uber’s CSO Joe Sullivan observes: “Most of the existing security defenses have been built to ...

Security Gaps in Access Management

One critical question security leaders are contending with in today’s emerging environments is, “how do you manage threats if you don’t know where the risk ...

Predictive-Security-Analytics-Use-Cases

Predictive Security Analytics Use Cases

The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics - identity analytics) vendor offers fundamentally defines the maturity of ...

What is the Threat Surface Equation?

We all grew up with Einstein’s E = mc 2. The equation is a staple for scientific minds. For CSOs and CISOs a recent risk calculation ...

The Vanishing Security Perimeter

The security perimeter has faded. Old defenses for environments can no longer be relied upon to ensure an organization’s protection from rising threats. Those are ...

Join Gurucul at RSA in San Francisco this February

Visit us at RSA Conference 2017, ‘Where the world talks security’.  RSA is one of the industry’s largest security events. It’s running February 13 through ...