Blog

Blog

August 5, 2019

How Industry Professionals Can Practice Cyber Safety on Social Media

Leverage the power of social networking as an industry professional and tips for practicing cyber safety on social media.

Read More

August 1, 2019

Detect Unknown Cyber Threats with Network Traffic Analysis

Gurucul Network Traffic Analysis applies behavioral analysis to network traffic to detect suspicious activities that most cybersecurity tools miss.

Read More

July 25, 2019

Would You Take Company Information If You Were Leaving Your Job?

More than 10% of security pros would take as much company information with them as possible before leaving their jobs, according to a Gurucul survey.

Read More

July 23, 2019

Counter Today’s Cyber Threats with Actionable Threat Intelligence

In the ongoing battle against ever more advanced cyberattacks, defenders must innovate to remain a step ahead of the newest threats. After all, yesterday’s defenses are no match for today’s attacks. Forward looking organizations need real-time, actionable intelligence about the…

Read More

July 15, 2019

Unconventional Controls Reinforce Successful Cyber Security Programs

A successful security program is risk-driven, not compliance-driven and makes use of unconventional controls, like security analytics.

Read More

July 2, 2019

ABCs of UEBA: I is for Insider Threat

Insider threat detection is a top use case for UEBA. You detect malicious insiders by monitoring their behavior – to notice when it becomes anomalous.

Read More

June 24, 2019

ABCs of UEBA: H is for Hijacking

Account compromise is on the rise. When an email address gets hijacked by a criminal, the hacker uses the compromised email account to impersonate the user.

Read More

June 10, 2019

What is Big Data? Understanding the 8 V’s

Learn about Big Data analytics, Data Warehouses, UEBA vendors offering open choice big data and more in this informative post about the 8 V's of Big Data.

Read More

May 11, 2019

ABCs of UEBA: G is for Gurucul

Gurucul was developing User Behavior Analytics technology long before Gartner coined the term UBA in 2014 and then updated it to UEBA in 2015.

Read More

May 6, 2019

ABCs of UEBA: F is for Fraud

UEBA powered by machine learning can be used to analyze millions of datapoints from a variety of siloed, cross-channel sources to detect and prevent fraud.

Read More

April 22, 2019

ABCs of UEBA: E is for Entity

The “E” in UEBA stands for “Entity” – User and Entity Behavior Analytics. What do we mean by Entity? And, what do we mean by Entity Behavior Analytics?

Read More

March 18, 2019

ABCs of UEBA: D is for Data

The volume of security data UEBA solutions must contend with is mind blowing. Learn the V's of Big Data and how it's leveraged by UEBA.

Read More