September Newsletter 2019

Quote of the Month

There are two reasons why we don’t trust people. First – we don’t know them. Second – we know them.”

The Backstory

Trust but verify, the old Russian proverb advises us. And while this once could have been the maxim for IT security, organizations are increasingly embracing the zero trust approach to keeping their systems and data safe.

The term “zero trust” was coined in 2009 by Forrester as a new model of information security[1]. This concept upends the old “castle-and-moat” mentality that focused on defending the perimeter against attackers, while assuming anything already on the inside was safe and cleared for access.

Zero Trust as a Defense Against External Cyberattacks and Insider Threats

Zero Trust centers on the belief that organizations should not trust anything either inside or outside the perimeter. Instead, the zero trust model stresses that everything and everyone attempting to connect to systems must be verified before granting access. As stated in the October 2018 Forrester report Five Steps To A Zero Trust Network, “a Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter.”

The focus on external threats at the expense of insider threats proved to be a flawed concept. According to the 2019 Verizon Data Breach Investigations Report, 34% of data breaches involve internal actors. Meanwhile, Cybersecurity Insiders’ 2019 Insider Threat Report revealed that 53% of organizations suffered an insider attack over the previous 12 months.

By now we’re all keenly aware of the costs that cyberattacks and malicious insiders can inflict on organizations.  Even so, the numbers can still seem staggering. One estimate pegs the cost of worldwide cybercrime at $600 billion a year.

And keep in mind, these exorbitant figures come despite companies spending more and more on cyber defense. IDC estimates that businesses will spend $101.6 billion on cybersecurity in 2020. That’s up 38% from 2016.

[1] No More Chewy Centers: The Zero Trust Model Of Information Security, Forrester Research, Inc., March 23, 2016

Read More

Infosys Gurucul Customer Story: Automating Real-time Threat Detection with Behavior Analytics


Infosys is a large IT consulting services company with 200,000 employees in 100 locations across 50 countries. The company’s main challenge in providing IT services to global customers is keeping up with the rapid change in the threat environment. They achieved the following objectives with Gurucul Behavior Based Security Analytics: insider threat detection, IP protection, detecting threats in real-time, reducing manual efforts, and reducing false positives. WATCH THE VIDEO.

New Solutions to Protect Against the Rise of Inside-Out Security Threats


Network Behavior Analytics Whitepaper

Concerned about inside security threats at your company? Gurucul CEO Saryu Nayyar explains what to be aware of and how you can better protect your organization.

Despite the endless drumbeat of data breach headlines, insiders — not outsiders — are the greatest concern to organizations. To take the pulse of IT security professionals on this threat, our company conducted a survey at this year’s RSA Conference which revealed that 72% of the  650 international respondents canvassed feel vulnerable to attacks from insiders.

Interestingly, those canvassed ranked user errors (39%) and malicious insiders (35%) as more worrisome than account compromise (26%) by external attackers. Adding salt to their wounds, nearly half of respondents said they can’t detect insider threats before data has left their companies.

The breach at Wipro earlier this year is a powerful reminder that account compromise attacks are essentially insider threats. In the case of Wipro, the Indian IT outsourcing and consulting giant, employee user account credentials were stolen in phishing attacks, allowing the fraudsters to look like insiders and to target the company’s downstream customers.New Solutions To Protect Against The Rise Of Inside-Out Security Threats

In the News

What’s New On Our Blog

Ransomware Implications for Medical Devices and the Healthcare Industry Ransomware Implications for Medical Devices and the Healthcare Industry. The threat of ransomware attacks on medical devices stems from changes in manufacturing. In recent years, manufacturers began including popular operating systems (OSs) on these devices. Formerly, medical devices used proprietary firmware or other exclusive features. That meant medical devices were rarely targeted in cyberattacks. Read More.
5 Signs You Need an Insider Threat Program. 5 Signs You Need an Insider Threat Program. Earlier this year, we conducted an Insider Threat survey to find out how prevalent the Insider Threat is in the minds of cybersecurity industry experts. After gathering and tallying up 700 responses, we looked at the results, and boy, were they fascinating!. Read More.
Famous Insider Threat Cases Famous Insider Threat CasesInsider threats are the biggest security risk for organizations because they can cause the most destruction. September is Insider Threat Awareness Month and we are sharing famous insider threat cases to expose the serious risk of insider cyber attacks. Read More.
ABCs of UEBA: K is for Known ABCs of UEBA: K is for Known. In the world of cyber security, there is the concept of known threats and unknown threats. Known threats are threats you know about, and methods exist to remediate said threats. Unknown threats are the things you don’t yet know about – like zero-day threats. Read More.
A Quarter of Workers Spend at Least 3 Months a Year Surfing the Web at Work A Quarter of Workers Spend at Least 3 Months a Year Surfing the Web at Work. It’s common to think of cyber threats as normally originating from outside the organization. However, data breaches often stem from those on the inside – whether their actions are intentionally malicious or careless mistakes. Read More.

Join Us

FS-ISAC 2019 Americas Fall Summit. November 17-20, 2019. Washington, DC. Join Gurucul at this event for actionable information on how to address evolving threats, develop new strategies and meet changing regulations.

Health-ISAC 2019 Fall Summit. December 2-6, 2019. San Diego, CA. Up your game with Gurucul! We offer Behavior Based Security Analytics and Intelligence to predict, detect and stop insider threats, healthcare provider fraud, and consumer fraud.

RSA Conference. February 24-28, 2020. San Francisco, CA. The 2020 RSA Conference theme is “Human Element” which is perfect for Gurucul. Our behavior based security analytics and intelligence detects and prevents risky, anomalous behavior – by malicious insiders or external hackers. Visit our booth for details!

Share this page: