BBA-Blog1-Image-(800x400)
09 Feb: The Vanishing Security Perimeter

The security perimeter has faded. Old defenses for environments can no longer be relied upon…

Blog---RSA-Coming-Up-(753x375)
07 Feb: RSA Conference – Announcing a new BOOK “Borderless Behavior Analytics – Who’s Inside? What’re They Doing?”

We are just released a new book by our CEO, Saryu Nayyar, Borderless Behavior Analytics…

rsaconference-2017-300x70
17 Jan: Join Gurucul at RSA in San Francisco this February

Visit us at RSA Conference 2017, ‘Where the world talks security’.  RSA is one of…

risk assessment and security analytics by data scientists
08 Dec: Risky Science of Risk Assessment

Data is the currency of the digital age. It is the foundation for analytics. The…

blog_thumb-nsa-contractor
19 Oct: NSA Contractor Suspected for Stealing Classified Data

Harold Thomas Martin may have stolen NSA classified data five months after Edward Snowden left…

mission-critical
29 Sep: Mission Critical Security Risk Analytics Needs in Federal Agencies

There are marked differences in Federal and Commercial spaces. Some are characterized by organizational mandates,…

emrimg
01 Sep: Mandates drive EMR/EHR, now IAM needs Identity Analytics

I’ve seen a lot of security trends through the years, but this one caught my eye…

Gartner-Catalyst
23 Aug: Gartner Catalyst San Diego Highlights

San Diego weather, great food, and spending time with leading Identity Analytics architects and innovators…

Active Directory Cleaning
16 Aug: What is the CIO and CISO’s Worst Kept Secret?

My colleagues and I have observed an issue which has plagued enterprises for some time…

Share this page: