solution

The Solution to Combat System Breaches

Protecting systems has never been more challenging. Boundaries for systems are blurring due to the merging of on-premise and cloud applications with the unintended consequence ...

panama-papers

Were Panama Papers Leaked By An Insider?

The infamous Panama Papers, also known as Mossack Fonseca breach, is by far one of the largest data breaches on record with over 11 million ...

User Behavior Analytics

Federal Highlights from RSA 2016

What are Federal agencies’ concerns addressed by User Behavior Analytics from Gurucul? RSA in San Francisco turned out to be an exciting event for Gurucul, ...

Surfaces Identity Misuse

Verizon Data Breach Digest – Surfaces Identity Misuse

One of the scenarios which caught my attention in the latest data breach digest was Insider Threat where one employee outsourced his own job to ...

cyberthreat-defense-report

Cyber threat Defense Report (CDR) 2016 Highlights

CyberEdge recently released the 2016 version of the Cyberthreat Defense Report (CDR) and new in the results this year is ranking User Behavior Analytics (UBA) ...

Identity as a threat plane was not discussed in Dictionary.com Word of the Year

Identity – Dictionary.com’s 2015 Word of the Year

Identity is the "2015 Word of the Year" based on Dictionary.com analysis of the most robust areas of language evolution and based on user interest ...

Machine Learning

Learning Some Machine Learning While Learning From It

Machine learning is ingrained in our day-to-day life. It is part of our spam filters mechanism, voice command smartphone interpretation and any search on Google. ...

Highlights from FS-ISAC (Fall 2015) San Diego, CA

Highlights from FS-ISAC (Fall 2015) San Diego, CA

If you missed out on FS-ISAC this week, below is an elevator ride summary of key security points. Sorry, unable to pass on the 80-degree ...

User Behavior Analytics

Where can I find more about User Behavior Analytics?

Ankur Chadda Product Marketing @Ankur_Chadda Oct 28, 2015 When I talk to friends and colleagues about user behavior analytics there are some people who know about ...

User behavior and inside threat detection

Question: What is the most common cause for data breaches? Answer: Weak and stolen credentials. About 76% of network intrusions involved weak credentials, according to ...