Blog

An emerging approach to IoT security involves using machine learning to detect anbnormal behaviors on a device that could indicate a cyberattack.

Logs are the lifeblood of User and Entity Behavior Analytics platforms. The more relevant log data ingested, the better the efficacy of the analytics.

Securing third party access is one of the best ways to protect against intentional or accidental data breaches, according to this Gurucul blog post.

One of the most valuable capabilities of a UEBA solution is its ability to predict, detect and stop known threats and unknown threats.

To gain a better understanding of risky user behavior in the workplace, Gurucul conducted a survey of 476 IT security professionals at Black Hat USA 2019.

It’s difficult to detect call center fraud, but Gurucul Fraud Analytics uses machine learning to analyze millions of datapoints from a variety of sources.

Gurucul offers open analytics on open choice of big data using open and standard REST JSON APIs for data ingestion and integration.

Leverage the power of social networking as an industry professional and tips for practicing cyber safety on social media.

Gurucul Network Traffic Analysis applies behavioral analysis to network traffic to detect suspicious activities that most cybersecurity tools miss.