August 5, 2019
How Industry Professionals Can Practice Cyber Safety on Social Media
Leverage the power of social networking as an industry professional and tips for practicing cyber safety on social media.
Read More
August 1, 2019
Detect Unknown Cyber Threats with Network Traffic Analysis
Gurucul Network Traffic Analysis applies behavioral analysis to network traffic to detect suspicious activities that most cybersecurity tools miss.
Read More
July 25, 2019
Would You Take Company Information If You Were Leaving Your Job?
More than 10% of security pros would take as much company information with them as possible before leaving their jobs, according to a Gurucul survey.
Read More
July 23, 2019
Counter Today’s Cyber Threats with Actionable Threat Intelligence
In the ongoing battle against ever more advanced cyberattacks, defenders must innovate to remain a step ahead of the newest threats. After all, yesterday’s defenses are no match for today’s attacks. Forward looking organizations need real-time, actionable intelligence about the…
Read More
July 15, 2019
Unconventional Controls Reinforce Successful Cyber Security Programs
A successful security program is risk-driven, not compliance-driven and makes use of unconventional controls, like security analytics.
Read More
July 2, 2019
ABCs of UEBA: I is for Insider Threat
Insider threat detection is a top use case for UEBA. You detect malicious insiders by monitoring their behavior – to notice when it becomes anomalous.
Read More
June 24, 2019
ABCs of UEBA: H is for Hijacking
Account compromise is on the rise. When an email address gets hijacked by a criminal, the hacker uses the compromised email account to impersonate the user.
Read More
June 10, 2019
What is Big Data? Understanding the 8 V’s
Learn about Big Data analytics, Data Warehouses, UEBA vendors offering open choice big data and more in this informative post about the 8 V's of Big Data.
Read More
May 11, 2019
ABCs of UEBA: G is for Gurucul
Gurucul was developing User Behavior Analytics technology long before Gartner coined the term UBA in 2014 and then updated it to UEBA in 2015.
Read More
May 6, 2019
ABCs of UEBA: F is for Fraud
UEBA powered by machine learning can be used to analyze millions of datapoints from a variety of siloed, cross-channel sources to detect and prevent fraud.
Read More
April 22, 2019
ABCs of UEBA: E is for Entity
The “E” in UEBA stands for “Entity” – User and Entity Behavior Analytics. What do we mean by Entity? And, what do we mean by Entity Behavior Analytics?
Read More
March 18, 2019
ABCs of UEBA: D is for Data
The volume of security data UEBA solutions must contend with is mind blowing. Learn the V's of Big Data and how it's leveraged by UEBA.
Read More