Archives
- Guruculs’ Integration with Palo Alto Networks Cortex XSOAR December 14, 2022
- Gurucul is a Top 3 SIEM December 6, 2022
- Gurucul Next-Gen SIEM Wins 2022 ‘ASTORS’ Homeland Security Award November 29, 2022
- Machine Learning 101 November 29, 2022
- Saryu Nayyar Wins 2022 Cyber Security Entrepreneur Award November 22, 2022
- Using Access Controls to Thwart Insider Threats November 15, 2022
- How Dominion Energy Built a Successful Insider Threat Program November 1, 2022
- Are You Afraid of the Unintentional Insider Threat? October 28, 2022
- Gurucul Receives 2022 Cloud Computing Security Excellence Award October 25, 2022
- Gurucul Recognized as Visionary in 2022 Gartner SIEM Report October 21, 2022
- Gurucul Positioned Furthest to the Right in 2022 Gartner SIEM Quadrant October 20, 2022
- Higher Education is a Growing Target for Threat Actors October 6, 2022
- Participate in Cybersecurity Awareness Month! October 4, 2022
- Ransomware and the Severe Impact on K-12 Public Schools September 27, 2022
- Saryu Nayyar Named Stevie Awards Finalist for Women in Business September 22, 2022
- What I Need to be a SOC Rock Star September 20, 2022
- Survey: Insider Threats Hard to Detect, Behavioral Analytics Key September 14, 2022
- September is National Insider Threat Awareness Month September 8, 2022
- SIEM/XDR Solutions Need to Contextualize the Attack to be Accurate September 2, 2022
- Gartner IAM: Identity is the Future of Security Operations September 2, 2022
- The Benefits of Cloud Native SIEM August 17, 2022
- Top UEBA Use Cases to Fuel Modern, Next-Gen Security Operations August 11, 2022
- Gurucul Next-Gen SIEM and XDR Lead Industry with Innovative Poly-Cloud and Multi-Cloud Offering August 10, 2022
- RSA 2022 Security Operations Efficiency Survey – What Did We Learn? August 2, 2022
- ESG Review of the Gurucul Security Analytics and Operations Platform July 28, 2022
- 70% of orgs feel 25-100% of Cybersecurity Budget Wasted July 20, 2022
- 2022 RSA Conference Trends: The Cloud Continues to Stimy SIEM and XDR July 20, 2022
- New Research: SOC Modernization and the Role of XDR July 13, 2022
- RSA Conference Security Trends: IAM Analytics for Zero Trust and XDR July 7, 2022
- How Access Analytics Solves Critical Security Controls July 5, 2022
- Behavior is the Leading Threat Indicator June 27, 2022
- Gurucul Wins Best Big Data Reporting Solution in 2022 CODiE Awards June 22, 2022
- Gurucul Wins InfoSec Award for Insider Threat Detection at RSA June 6, 2022
- Gurucul Launches Cloud-native SOC Platform with Threat Detection June 2, 2022
- Moving From ‘the log dustbin’ to Effective Security Operations May 25, 2022
- Gurucul named 2022 SIIA CODiE Award Finalist in Big Data May 24, 2022
- Leveraging Machine Learning for Cross-Channel Fraud Detection May 9, 2022
- 3 Spring Cleaning Tips for Improving Cybersecurity Hygiene May 2, 2022
- Solving Unsecured Privileged Accounts with Identity Analytics April 26, 2022
- What is Machine Learning? April 18, 2022
- Lapsus$ Group Exposes Internal Threats Are Also External Threats April 11, 2022
- Sophisticated Cyberattacks Pit Security Teams Against the Clock April 5, 2022
- 5 Signs You Need an Insider Threat Program March 29, 2022
- Redefining Cyber Defenses for Financial Institutions March 22, 2022
- You Should Be Concerned About Insider Risk March 14, 2022
- Is Zero Trust as Good as It Gets? March 9, 2022
- Look Beyond External Threats to Insider Threats February 28, 2022
- Key Initiatives for Improving Threat Detection and Response February 21, 2022
- The Hunt for Log4j February 14, 2022
- Gurucul Sees Record Growth in Revenue, Customers, and Partners in 2021 February 8, 2022
- The Top Cybersecurity Initiative for 2022 is Cloud Security February 7, 2022
- Emerging Cybersecurity Trends in 2022 January 31, 2022
- Impact of Ransomware on Medical Devices and the Healthcare Industry January 24, 2022
- Benefits of an Insider Threat Detection Program January 17, 2022
- The Number 1 Enemy of XDR and SIEM: Dwell Time January 10, 2022
- Top 10 Gurucul Blog Posts of 2021 January 4, 2022
- Why Manufacturing IP is So Susceptible to Cyber Theft December 29, 2021
- The State of Cybersecurity Preparedness in Healthcare December 21, 2021
- Biggest Breaches of 2021 – Looking Back at the Year’s Top Cyberattacks December 13, 2021
- Allina Health Customer Story: Monitoring Medical Devices December 10, 2021
- How Federal Agencies Can Thwart Nation-State Attacks December 6, 2021
- Why Nation-State Attackers Target Critical Infrastructure November 30, 2021
- Build Versus Buy: Can You Build Your Own SIEM? November 22, 2021
- Famous Insider Threat Cases November 17, 2021
- How Retailers Can Secure Themselves for the Holiday Rush November 15, 2021
- Cyber Thieves are Shopping for You Online November 5, 2021
- The Story Behind Dwell Time November 1, 2021
- Cybersecurity First: Making Security a Priority October 25, 2021
- Explore, Experience and Share Cybersecurity Careers October 19, 2021
- Gurucul Experts Speak on Insider Threats at 2021 TechNet Cyber October 15, 2021
- Fight Phishing Attacks with Machine Learning and Security Analytics October 12, 2021
- October is Cybersecurity Awareness Month October 4, 2021
- Best Practices for Implementing an Insider Threat Program September 27, 2021
- Automating Real-time Threat Detection with Behavior Analytics September 24, 2021
- Insider Threat Personas: Who is Responsible for Insider Attacks? September 20, 2021
- Top 10 Tips to Prevent Insider Threats September 13, 2021
- The Origin of Insider Attacks: Where do Insider Threats Come from? September 7, 2021
- ABCs of UEBA: Z is for Zero Trust August 23, 2021
- How to Detect Zero Day Attacks with an Analytics-Driven SIEM August 16, 2021
- ABCs of UEBA: Y is for Yield August 10, 2021
- ABCs of UEBA: X is for eXfiltration August 2, 2021
- Gurucul CEO Saryu Nayyar named Top 10 Women in Cybersecurity 2021 August 2, 2021
- Real-Time Analytics: Vital for SIEM Efficacy & False Positives July 26, 2021
- Stop Misuse of Privileged Accounts: Identity Analytics with UEBA July 19, 2021
- Allina Health wins 2019 CSO50 for Patient Privacy Project July 15, 2021
- How MITRE ATT&CK Coverage Improves the Effectiveness of Your SIEM July 12, 2021
- Monitoring User Behavior is The Solution to Combat System Breaches June 29, 2021
- New Year, Same Breaches, Worse Outcomes June 22, 2021
- Gurucul UEBA Wins 2021 Fortress Award for Advanced Analytics June 15, 2021
- Why Legacy SIEM Makes Little Sense Today June 15, 2021
- May I Have The Envelope Please… June 2, 2021
- Gurucul Wins Top Insider Threat Solution in Cyber Defense Magazine May 19, 2021
- Do You Think Your Healthcare Data Is Safe? May 18, 2021
- Predictive Security Analytics Use Cases May 11, 2021
- ABCs of UEBA: W is for Watchlist May 4, 2021
- Security Gaps in Access Management April 26, 2021
- What is an insider threat? April 19, 2021
- ABCs of UEBA: V is for Vulnerability April 12, 2021
- Cleaning House: Getting Rid of Malicious Insiders April 6, 2021
- ABCs of UEBA: U is for User March 29, 2021
- ABCs of UEBA: T is for Time March 22, 2021
- AI-Based Predictive Threat Hunting March 8, 2021
- Best Practices for Retiring your Legacy Kit March 2, 2021
- Context is King: Real World Examples on Preventing Data Breaches February 23, 2021
- Go Phish February 22, 2021
- ABCs of UEBA: S is for Sabotage February 15, 2021
- XDR Unifies Security Telemetry to Contextualize Risk February 9, 2021
- Using Data to Fuel Transformation Across the Business February 1, 2021
- When Cyberattacks Get Physical January 28, 2021
- What’s Old is New Again January 25, 2021
- Insider Threats Are on the Rise and Growing More Costly. You Need the Right Tools to Detect Them January 19, 2021
- Automating Incident Response with Machine Learning January 12, 2021
- Gurucul Wins Best Security Automation in 2020 Excellence Awards January 7, 2021
- Our Top 10 Blog Posts of 2020: Insider Threats, Cybersecurity and UEBA January 4, 2021
- 2021 Cybersecurity Predictions: How Bright is Our Future? December 29, 2020
- Reindeer Tails From The SOC December 21, 2020
- Gurucul Cloud-Native XDR Sets Standard new for Threat Detection & Response December 17, 2020
- SIEM Advanced Threat Detection December 16, 2020
- AI Driven SOC Automation December 8, 2020
- Security Analytics and SIEM Best Practices December 1, 2020
- ABCs of UEBA: R is for Risk November 24, 2020
- Gurucul Named 2020 Red Herring Top 100 North America Winner November 23, 2020
- Insider Threat Case Studies: Why You Need Advanced Behavior Analytics November 17, 2020
- Ransomware vs Healthcare: A Dangerous Liaison November 3, 2020
- Cybersecurity Horror Stories Don’t Have to Keep You Up at Night October 28, 2020
- 2020 US Election Security is Paramount October 27, 2020
- The Future of Connected Devices October 26, 2020
- Securing Internet-Connected Devices in Healthcare October 19, 2020
- Securing Devices at Work and at Home October 12, 2020
- If You Connect It, Protect It October 5, 2020
- Drive Security Automation at Machine Speed September 4, 2020
- Some 8 hour days feel like a week. September 1, 2020
- The Role of Security Analytics in a Zero Trust Environment August 24, 2020
- A Security Evolution: Taking Security Beyond SIEM with UEBA August 17, 2020
- Fraud and Phishing, Oh My! August 13, 2020
- The End is Nigh – for Windows 7 August 12, 2020
- Gurucul CEO Saryu Nayyar named Top 100 Women in Cybersecurity 2021 August 3, 2020
- Combat Phishing Attacks Using Modern Machine Learning Algorithms July 23, 2020
- Who Watches the Watchers? July 15, 2020
- Why are IAMs Still Struggling Today? July 9, 2020
- Insider Threats are on the Rise June 30, 2020
- Gurucul Wins Best Security Analytics Product in 2020 Fortress Awards June 25, 2020
- Global Security Operations with a Remote Workforce June 23, 2020
- ABCs of UEBA: Q is for Qualitative Analysis June 18, 2020
- Aligning MITRE ATT&CK with Advanced Analytics June 9, 2020
- Gurucul Named Best Behavior Analytics Solution by SC Awards June 5, 2020
- Acknowledging 5 Common Gaps in Existing Security Infrastructure June 2, 2020
- Hungry for Automated Security Controls? Try These Recipes May 28, 2020
- ABCs of UEBA: P is for PRIVILEGE May 20, 2020
- Gurucul CEO Saryu Nayyar: Top Female Cybersecurity Leader May 13, 2020
- ABCs of UEBA: O is for OUTLIER May 13, 2020
- Real-time Visibility Into Access Risks Reduces The Attack Surface May 6, 2020
- Gurucul Wins 2020 TMCnet Teleworking Solutions Excellence Award April 30, 2020
- ABCs of UEBA: N is for NETWORK April 28, 2020
- Unmanaged Medical Devices are Critically Vulnerable to Cyberattacks April 21, 2020
- Gurucul Offers Free Services to Combat COVID-19 Cyber Attacks April 16, 2020
- COVID-19 Lures Cybercriminals are Using to Steal from You April 14, 2020
- Remote Work Leaves Physical Defenses Exposed April 7, 2020
- Gurucul Offers COVID-19 Cyber Risk Models Tailored with ML April 1, 2020
- Gurucul Named Strong Performer in Security Analytics March 24, 2020
- A New Security Model for Remote Workers March 24, 2020
- 60% of RSA Attendees Access Irrelevant Docs – Survey March 18, 2020
- Cybersecurity Professionals Exhibit Risky Behavior – RSA Survey March 18, 2020
- When SOC Teams Are Impacted by the Coronavirus March 17, 2020
- Coronavirus Accelerates Need to Secure Remote Workers March 16, 2020
- Gurucul Wins 2020 Cyber Defense Infosec Award at RSA Conference February 27, 2020
- Applying Behavior Analytics to the MITRE ATT&CK Framework February 26, 2020
- Gurucul Launches Cloud-Native Security Analytics for Borderless IT February 26, 2020
- Gurucul’s AI/ML Automates Threat Hunting for Faster Response Times February 20, 2020
- The Identity Management Blind Spot February 13, 2020
- Gurucul Automates Threat Detection & Response for MITRE ATT&CK February 13, 2020
- Risky Science of Risk Assessment February 5, 2020
- Who Do You Trust? January 28, 2020
- Gurucul and Analyst Present Zero Trust Roadmap with Analytics January 16, 2020
- Top 10 Cybersecurity Blog Posts of 2019 January 2, 2020
- 11 Cybersecurity Predictions for 2020 December 5, 2019
- Build vs Buy: How Should You Implement Security Analytics? December 3, 2019
- Gurucul Labs – Best Managed Security Service in 2020 SC Awards December 3, 2019
- Cyber Fraud Protection Tips for Secure Online Shopping November 25, 2019
- Simple Fraud Prevention Tips for Black Friday Shopping November 21, 2019
- The 2020 Insider Threat Report is Here November 14, 2019
- ABCs of UEBA: M is for Machine Learning November 12, 2019
- Why Signature-Based Defense is Inadequate for Cybersecurity November 8, 2019
- Gurucul-Cybersecurity Survey: Half of Firms Late to Respond Insiders November 5, 2019
- Be afraid … Be very afraid October 31, 2019
- Gurucul Detects Medical Device Security Threats Using Entity Analytics October 29, 2019
- Security Analytics Is the New Approach to IoT Security October 17, 2019
- ABCs of UEBA: L is for LOGS October 7, 2019
- Incorporate Third-Party Vendors in Your Insider Security Program September 30, 2019
- ABCs of UEBA: K is for Known September 3, 2019
- Insider Threats: Understanding Risky User Behavior in the Workplace August 29, 2019
- Gurucul Survey: 1 in 4 Workers Would Steal Info for Competing Firm August 27, 2019
- Detect Call Center Fraud with Security Analytics August 19, 2019
- ABCs of UEBA: J is for JSON August 13, 2019
- How Industry Professionals Can Practice Cyber Safety on Social Media August 5, 2019
- Detect Unknown Cyber Threats with Network Traffic Analysis August 1, 2019
- Gurucul Behavior Based Traffic Analysis Detects Unknown Threats July 30, 2019
- Equifax: The Tip of The Proverbial Penalties Iceberg July 30, 2019
- Would You Take Company Information If You Were Leaving Your Job? July 25, 2019
- Counter Today’s Cyber Threats with Actionable Threat Intelligence July 23, 2019
- Unconventional Controls Reinforce Successful Cyber Security Programs July 15, 2019
- Gurucul Named Vendor in 2019 Gartner Market Guide for Fraud Detection July 8, 2019
- ABCs of UEBA: I is for Insider Threat July 2, 2019
- 1 In 10 People Would Take Company Information When Leaving a Job July 1, 2019
- Different Insider Threat Personas and How To Detect Them June 27, 2019
- Gurucul Named Cyber Risk/Security Product of the Year by Risk Magazine June 27, 2019
- Gurucul Named Insider Threat Defense Vendor to Watch by Gartner June 26, 2019
- ABCs of UEBA: H is for Hijacking June 24, 2019
- Travel Tips to Keep You Safe from Cybercrime, Fraud & Identity Theft June 19, 2019
- What is Big Data? Understanding the 8 V’s June 10, 2019
- ABCs of UEBA: G is for Gurucul May 11, 2019
- ABCs of UEBA: F is for Fraud May 6, 2019
- Customers Discuss Gurucul’s Security Analytics Technology May 6, 2019
- More Cowbell Baby! April 30, 2019
- ABCs of UEBA: E is for Entity April 22, 2019
- Insider Threat Survey Report: RSA 2019 April 14, 2019
- 75% of RSA Attendees Vulnerable to Insider Threats – Survey April 11, 2019
- Look At Risk as More of a Compass Than a Watch April 9, 2019
- Gurucul Shortlisted for Best Behavior Analytics in SC Awards March 27, 2019
- The College Admissions Scandal: Dethroning Privilege March 25, 2019
- ABCs of UEBA: D is for Data March 18, 2019
- A Nut Worth Cracking March 11, 2019
- Risk Analytics 7.0: Machine Learning for Real-Time Threat Detection March 6, 2019
- Gurucul Extends Behavior-based Security Analytics to Entire IT Stack February 27, 2019
- Join Gurucul at RSA Conference 2019 in San Francisco February 22, 2019
- Gurucul Reports Record Growth in 2018 February 21, 2019
- ABCs of UEBA: C is for Context February 14, 2019
- ABCs of UEBA: B is for Behavior February 4, 2019
- You’re Paying Too Much for Your SIEM January 31, 2019
- ABCs of UEBA: A is for Analytics January 23, 2019
- Detect Merchant Fraud with “Outlier Categorical Model” January 14, 2019
- Protect Classified Information with “Identity Classification” January 8, 2019
- Top 10 Blog Posts of 2018 January 2, 2019
- The Incident Response Army is Rapidly Growing December 27, 2018
- How Do We Detect Insider Threats? December 20, 2018
- Fraudsters are Banks Chief Competition December 10, 2018
- Streamline Investigations with “Link Analysis” December 1, 2018
- Behavior Analytics and Model Driven Security November 30, 2018
- Gurucul Wins Platinum 2018 ASTORS Homeland Security Award November 26, 2018
- Identify Good UEBA Data with “Feature Analysis” November 15, 2018
- Data Democracy Shines in the Wake of the Cloudera- Hortonworks Merger November 8, 2018
- Celebrate 2018 ‘ASTORS’ Winners & Finalists in NYC November 2, 2018
- Thwart Money Laundering with “Dimensionality Reduction” October 31, 2018
- Allina Health Recognized with 2019 CSO50 Award for Patient Data Privacy Project October 31, 2018
- Global Risk Analytics Market October 28, 2018
- Automating Security Controls Using Models and Security Orchestration October 25, 2018
- Aetna Gurucul Customer Story: Model Driven Security October 22, 2018
- Prevent Fraud with “Rare and Volume Based Analytics” October 16, 2018
- Stop Fileless Malware with “Abnormal PowerShell Command Execution” October 11, 2018
- Identify Outlier Access with “Clustering and K-Means” October 4, 2018
- How Do You Establish Credibility? October 2, 2018
- Dynamic Provisioning: “Workflow Classification Regression Tree” September 28, 2018
- Gurucul Named Strong Performer in Security Analytics September 24, 2018
- Detect Host Compromise with “Domains Generated Algorithmically” September 20, 2018
- Gurucul Introduces Managed Security Analytics Service September 12, 2018
- Detect Privileged Access Abuse with “Linear Regression” September 11, 2018
- Gurucul CEO Named Thought Leader of the Year by SC Media September 6, 2018
- Discover Privileged Accounts with “Entitlement Classification” September 5, 2018
- Saryu Nayyar Named Finalist for the 2018 Women of Influence Awards August 30, 2018
- Pinpoint Departing Users with “Predictive Flight Risk” August 30, 2018
- Security Analytics is not a SIEM August 29, 2018
- Detect Insider Threats with “Email Fuzzy Logic” August 22, 2018
- A Q&A With Our CEO About Insider Threats in Cyber Security August 21, 2018
- Machine Learning Madness at Black Hat USA! August 3, 2018
- Are You Struggling with Thousands of DLP Events Per Day? July 16, 2018
- Analytics-Based Controls without Causing Undue Business Impact July 3, 2018
- 125+ cybersecurity companies in healthcare to know | 2018 July 2, 2018
- Identity Analytics Use Case: Dynamic Provisioning June 15, 2018
- Gurucul Recognized as Vendor for Fraud Analytics by Gartner June 6, 2018
- The Challenges of Extracting Critical Security Data from SIEMs June 5, 2018
- Behavior Doesn’t Lie: NH-ISAC and Model Driven Security in Healthcare May 31, 2018
- Gurucul Wins 2018 Fortress Cyber Security Award May 30, 2018
- The Biggest Cyber Threats Keeping Healthcare Executives Up at Night May 29, 2018
- Prevent Advanced Attacks with Gurucul’s Multi-channel Fraud Analytics May 16, 2018
- Gurucul Wins 2018 InfoSec Award at RSA Conference April 26, 2018
- Allina Health Customer Story: Protecting Patient Privacy April 25, 2018
- Gurucul CEO to Unveil 2nd Edition of Behavior Analytics at RSA 2018 April 13, 2018
- Announcing the Second Edition of Borderless Behavior Analytics April 6, 2018
- Two Gurucul Customers Win 2018 CSO50 Awards for UBA March 20, 2018
- The Rising Need for Automated Risk Response & Security Analytics February 9, 2018
- When Rules Don’t Apply January 17, 2018
- Meltdown & Spectre – Nearly Every Computer and Device at Risk January 8, 2018
- Preparing for EU GDPR: The Steps to Readiness December 6, 2017
- Gurucul CSSO Named IT Security and Strategy Officer of the Year December 6, 2017
- Gurucul Selected for Predictive Security Analytics by US Government November 20, 2017
- EU GDPR: A Reality Check on Non-Compliance Penalties (Part 2/3) November 7, 2017
- EU GDPR & Advanced Security Analytics Solution (1/3) October 25, 2017
- SEC Breach and Warnings of Security Vulnerabilities October 16, 2017
- The Equifax Breach: Implications of a Tipping Point Event September 14, 2017
- Gurucul Joins VMware Mobile Security Alliance September 12, 2017
- Cybersecurity Innovation in the Public and Private Sectors August 9, 2017
- Gurucul Expands to Asia Pacific to Meet Growing Demand in Region June 21, 2017
- Gurucul Supports Open Choice for UEBA Data Lakes June 14, 2017
- Intersection of Big Data & Identity Intersect Vertical Solution Silos April 13, 2017
- Why did Machine Learning Arrive Late to Predictive Security Analytics? April 4, 2017
- Gurucul CSSO – “Account Compromise Self-Audits at InfoSec World 2017” March 29, 2017
- Gurucul Named Coolest Threat Detection Vendor for 2017 by CRN March 9, 2017
- US Security Chiefs’ book on Identity Cyber Attacks now on Kindle! March 1, 2017
- What is the Threat Surface Equation? February 24, 2017
- Gurucul Wins Best User Behavior Analytics Solution February 13, 2017
- The Vanishing Security Perimeter February 9, 2017
- Gurucul Wins 2016 Homeland Security Platinum Cyber Award January 5, 2017
- Gurucul Named Representative Vendor in Gartner Market Guide for UEBA December 19, 2016
- Gurucul CEO Named Female Entrepreneur of the Year December 1, 2016
- Gurucul Discovery Eliminates Privileged Access Blind Spots November 29, 2016
- Gurucul HBA and DLP Detect Threats Across Cloud & On-Premises Infrastructures November 15, 2016
- Intel Security Alliance Delivers Integrated Security vs. Cyberattacks November 3, 2016
- Gurucul STUDIO™ Detects User & Entity Threats with Custom ML Models October 25, 2016
- NSA Contractor Suspected for Stealing Classified Data October 19, 2016
- Mission Critical Security Risk Analytics Needs in Federal Agencies September 29, 2016
- Mandates drive EMR/EHR, now IAM needs Identity Analytics September 1, 2016
- What is the CIO and CISO’s Worst Kept Secret? August 16, 2016
- Gurucul Integrates with Okta to Detect Cloud Security Threats July 27, 2016
- Gurucul Extends Cloud Security UBA to Protect MS Office 365 June 22, 2016
- Gurucul Named Best Behavior Analytics Platform in SC Awards June 9, 2016
- Gurucul Introduces INSIDER Channel Partner Program June 1, 2016
- Gurucul Names Steve Moscarelli VP Sales for Identity-based Security May 12, 2016
- Gurucul Appoints Beau Hutto Vice President of Federal Sales March 15, 2016
- Gurucul Wins Best Behavior Analytics Platform at SC Awards 2016 March 8, 2016
- Gurucul Wins Three Cyber Security Awards at RSA 2016 February 29, 2016
- Ex-CIO of US DoD to Speak on Identity as Attack Vector @ RSA 2016 February 25, 2016
- KuppingerCole Recognizes Gurucul for User Behavior Analytics February 16, 2016
- Gurucul HBA Protects On-Premises and Cloud Apps from Attacks December 16, 2015
- Identity – Dictionary.com’s 2015 Word of the Year December 15, 2015
- Infrastructure and Bringing in New Technology: Advice to a New CISO December 15, 2015
- Gurucul Finalist for Best Behavior Analytics in SC Trust Awards December 14, 2015
- How Directories and Identity Management are Changing December 7, 2015
- The Importance of Behavior & Predictive Security Analytics December 1, 2015
- Security Leaders on Phishing Attacks, Compromised Credentials, & IAM November 4, 2015
- Role of Identity in Recent Breaches at Cyber Security World 2015 October 29, 2015
- Gurucul Talks about Fraud Prevention at FS-ISAC Fall Summit October 28, 2015
- Cyber Security Leaders Talk About Changes in Security Solutions October 26, 2015
- Gurucul Wins SINET 16 Innovator Competition for 2nd Consecutive Year October 6, 2015
- Gurucul Enters EMEA to Meet Demand for User Behaviour Analytics October 1, 2015
- Gurucul Meets Primary Use Cases in Gartner’s UEB Market Guide September 30, 2015
- How Important is Identity as a Threat Plane? September 25, 2015
- Gurucul Adds ID Theft Protection to User Behavior Analytics Platform August 4, 2015
- Gurucul’s Predictive Security Analytics Solution August 3, 2015
- Gurucul Appoints Security Veteran Vice President of Marketing July 28, 2015
- Gurucul Earns Gold for Fraud Prevention in Global Excellence Awards May 11, 2015
- Cyber Defense Magazine Honors Gurucul with Two Awards April 29, 2015
- Gurucul Introduces Identity-Based Threat Detection for Cloud Applications April 16, 2015
- Gurucul Wins Most Valuable Product Award for Threat Detection April 6, 2015
- Gurucul’s Identity-based Threat Detection & Deterrence Software Suite March 26, 2015
- Gurucul CSO to Discuss Insider Threat at INTERZONE Conference March 4, 2015
- Gurucul Adds Renee Guttmann to Executive Advisory Board January 21, 2015
- Teri Takai, Former DOD CIO, Joins Gurucul Advisory Board November 24, 2014
- Gurucul is Named a Top Emerging Cybersecurity Company by SINET November 17, 2014
- Getting Started with Predictive Security Analytics October 15, 2014
- What your SIEM isn’t Telling you – Discover Risk Analytics September 9, 2014
- Gartner Names Gurucul Key Vendor in 2014 User Behavior Analytics September 9, 2014
- Gurucul Forms Executive Advisory Board with Industry Leaders July 30, 2014
- Gurucul Wins 3 Awards, Including Gold, at 2014 NPG Awards June 24, 2014
- Gurucul Recognized as a Gartner “Cool Vendor” May 13, 2014
- Gurucul Joins McAfee Security Innovation Alliance February 25, 2014
- Ex-Juniper CISO, Leslie Lambert, now Chief Strategy Officer at Gurucul May 11, 2013
- Gurucul Finalist in 2013 Hot Companies and Best Products Awards April 30, 2013
- Gurucul Wins Silver in 2013 Security Industry Global Awards March 20, 2013
- Gurucul’s Identity-Centric Behavioral Risk Intel Is Award Finalist January 21, 2013
- Gurucul Launches Security Risk Intelligence for NetApp® Storage December 3, 2012
- Gurucul Pioneers Intelligent Roles® with Security Risk Intelligence November 11, 2012