Archives
2019
- Top 5 Cybersecurity Predictions for 2020 December 31, 2019
- Personal Information of 15 Million Canadians Compromised December 31, 2019
- Podcast: Managing Access and Insider Threats December 20, 2019
- Lifelabs Buckles and Pays Ransom for its Data December 20, 2019
- Royal Mail Warns Against ‘Free iPhone’ Text Scams Currently Circulating December 19, 2019
- Cybersecurity Predictions for 2020: 45 Industry Experts Have Their Say December 19, 2019
- Gurucul: Data Science and Machine Learning for Enhanced IAM December 19, 2019
- Top 10 IAM Consulting/Services Companies – 2019 December 19, 2019
- PRIZE FOOL Royal Mail text scam offering free iPhone 11 Pro could let fraudsters rinse your bank account ahead of Christmas December 19, 2019
- Smartphone Analysis & Stats: Personal Use Leaves Work Smartphones Hackable December 19, 2019
- Want More Publicity? 10 Ways Tech Execs Can Help Build Their Company’s Public Profile December 18, 2019
- You Should Be Concerned About Insider Risk December 17, 2019
- Gurucul 2020 Predictions: 11 Ways Cybersecurity Will Change in 2020 December 13, 2019
- Government Departments Admit Rise In Lost Laptops December 12, 2019
- Allina Health Gurucul Customer Story: Monitoring Medical Devices December 10, 2019
- Benefits of an Insider Threat Detection Program December 10, 2019
- 11 Cybersecurity Predictions for 2020 December 5, 2019
- Build vs Buy: How Should You Implement Security Analytics? December 3, 2019
- Gurucul Labs Shortlisted as Best Managed Security Service in 2020 SC Awards December 3, 2019
- Experts Reaction On 1.2 Billion Records Found Online On An Exposed, Unsecure Single Server December 2, 2019
- Industry Experts Discuss Protecting Against Insider Threats December 1, 2019
- Cyber Fraud Protection Tips for Secure Online Shopping November 25, 2019
- Experts Comments On Macy’s Customer Payment Info Stolen In Magecart Breach November 25, 2019
- Simple Fraud Prevention Tips for Black Friday Shopping November 21, 2019
- Security or Visibility? Pick One November 19, 2019
- The 2020 Insider Threat Report is Here November 14, 2019
- 13 Outdated Tech KPIs (And What Businesses Should Track Instead) November 14, 2019
- ABCs of UEBA: M is for Machine Learning November 12, 2019
- Glimpse Malware Uses Alternative DNS to Evade Detection November 12, 2019
- SIEM Complexity and Cloud Visibility Put Companies at Risk November 8, 2019
- Gurucul Study Shows Nearly Half of Companies Can’t Respond to Insider Threats Until It’s Too Late November 8, 2019
- Why Signature-Based Defense is No Longer Adequate for Today’s Cybersecurity November 8, 2019
- Cloud Covers Up Insider Threats November 7, 2019
- Trend Micro Insider Breach Exposes Need for Data-Centric Protection November 7, 2019
- Nikkei Falls Foul of £22 m BEC Scam in a Single Transaction November 6, 2019
- Microsoft Office for Mac Could Enable Hackers to Sidestep Endpoint Protection November 5, 2019
- The Role of Security Analytics in a Zero Trust Environment November 5, 2019
- Gurucul-Cybersecurity Insiders Survey Finds Nearly Half of Companies Can’t Respond to Insider Threats Until it’s Too Late November 5, 2019
- Gurucul Says Medtech is Increasingly Using Security Software November 1, 2019
- World’s First TLD Among Registrars Hacked November 1, 2019
- Windows Targeted by New Adwind jRAT October 31, 2019
- Be afraid … Be very afraid October 31, 2019
- Gurucul Detects Medical Device Security Threats Using Entity Analytics October 29, 2019
- Five Main Differences between SIEM and UEBA October 24, 2019
- Model Behaviour October 21, 2019
- Security Analytics Is the New Approach to IoT Security October 17, 2019
- Cheater, Cheater: Dishonest Workplace Behavior Is a Complicated Phenomenon October 15, 2019
- IoT Has Spawned Entity-Based Risks — Now What? October 15, 2019
- Volusion data breach impacts 6,500 sites including the Sesame Street store October 10, 2019
- ABCs of UEBA: L is for LOGS October 7, 2019
- UK Local Councils Faced 263 Million Cyberattacks in First Half of 2019 October 7, 2019
- Cybersecurity Awareness Month – Travel Tips to Keep You Safe from Cybercrime, Fraud & Identity Theft October 3, 2019
- Key Statistics To Know When Selecting a SIEM Solution October 2, 2019
- Account for Third Party Vendors in Your Insider Threat Security Program September 30, 2019
- 12 Cool Tech Innovations That Contribute To The Greater Good September 27, 2019
- Businesses Change Tactics to Protect Against Third Party Security Risk September 27, 2019
- Dubai Firm Loses £42,000 in Phishing Attack September 26, 2019
- Building Your Business’s AI Future September 26, 2019
- ‘Tortoiseshell’ Group Targets IT Companies through Supply -Chain Attacks September 24, 2019
- Infosys Gurucul Customer Story: Automating Real-time Threat Detection with Behavior Analytics September 24, 2019
- MSPs Caught Between the Risks and Rewards of Protecting Customers September 20, 2019
- Who Guards the Guards of IT? Insider IT Espionage a Weak Point of Cybersecurity September 19, 2019
- Identifying the Threat from Within September 19, 2019
- Garmin SA Shopping Portal Breach Leads To Payment Data Theft September 17, 2019
- Ransomware Implications for Medical Devices and the Healthcare Industry September 17, 2019
- IT Employees Are Biggest Security Risk September 13, 2019
- 5 Signs You Need an Insider Threat Program September 13, 2019
- Adversaries Are Eyeing Your IT Staff. Why Aren’t You? September 5, 2019
- Create an Action Plan for Insider Threat September 5, 2019
- Famous Insider Threat Cases September 5, 2019
- Perks of Work: The Endless Summer of Web Surfing September 4, 2019
- ABCs of UEBA: K is for Known September 3, 2019
- Social Media Apps Worsen Internal Risks to Enterprises September 3, 2019
- New Solutions To Protect Against The Rise Of Inside-Out Security Threats September 2, 2019
- Check Point Vulnerability Allowed Hackers to Escalate Privileges and Run Code September 2, 2019
- 1 in 4 Employees Would Steal Company Information to Secure Their Next Job August 29, 2019
- One in Four Security Pros Would Steal Company Info to Bag Better Job August 29, 2019
- A Quarter of Workers Spend at Least 3 Months a Year Surfing the Web at Work August 29, 2019
- One in Four Workers Would Steal Information to Get a Job at a Competitor August 29, 2019
- Some Employees Willing to Use Company Data to Snag Job at Competitor August 29, 2019
- Employees, MSPs and Developers Top Third-Party Risks August 27, 2019
- According to Gurucul Survey One in Four Workers Would Steal Company Information to Secure Job at Competing Firm August 27, 2019
- Nearly 75% of RSA Attendees Surveyed Said They are Vulnerable to Insider Threats August 27, 2019
- The Benefits of Putting Security in Network Behavior Analytics August 22, 2019
- Detecting Bad Actors via Behavioural Analytics August 21, 2019
- Are the Ransomware Floodgates Open in the US? August 20, 2019
- Ransomware and Medical Devices: How Behavior Analytics Can Protect Patients August 19, 2019
- Detect Call Center Fraud with Security Analytics August 19, 2019
- More Problems For British Airways – Now An e-ticketing Vulnerability Has Been Discovered August 16, 2019
- Threat or Treat August 16, 2019
- Choice Hotels Data Breach: 700k Data Records Lost to Hackers August 15, 2019
- Vast Majority of Phishing Emails Getting Past Widely-Used Email Filters August 14, 2019
- ABCs of UEBA: J is for JSON August 13, 2019
- Who Monitors Employee Monitoring When AI is in the Driving Seat? August 9, 2019
- Gurucul VP of Marketing and COO Discuss Security Analytics with SecurityGuyTV.com August 8, 2019
- 12 Big New Network And Endpoint Security Tools From The Black Hat 2019 Conference August 7, 2019
- Is Your Business Spying on Your Online Activity? August 6, 2019
- How Will We Staff The IT Workforce of The Future? August 5, 2019
- How to Practice Cyber Safety on Social Media as an Industry Professional August 5, 2019
- New Gurucul Network Traffic Analysis Tool Debuts August 4, 2019
- Detect Unknown Cyber Threats with Network Traffic Analysis August 1, 2019
- Honda Database Exposure “a Hacker’s Dream”, Leaving Company Secrets Open to the World August 1, 2019
- Gurucul Network Behavior Analytics Solution Provides Identification of Advanced and Unknown Cyber Threats August 1, 2019
- Insidious Threat of Insider Attacks on the Rise, finds ‘ASTORS’ Award Winner Gurucul (Multi-Video) July 30, 2019
- Gurucul Behavior Based Network Traffic Analysis Detects Unknown Threats July 30, 2019
- Equifax: The Tip of The Proverbial Penalties Iceberg July 30, 2019
- Assessing the Risk of the Former Employee July 29, 2019
- Email Threat Confidence Sky High, But Is It Misplaced? July 26, 2019
- Would You Take Company Information If You Were Leaving Your Job? July 25, 2019
- Behaviour Analytics Can be Used to Detect Employee Burnout: Survey July 24, 2019
- Equifax to Pay Up to £340 Million for Breach in US FTC Settlement July 24, 2019
- Former NSA Contractor Gets Nine-years for Stealing Classified Documents July 24, 2019
- Insider Threat and Activity Monitoring July 23, 2019
- What Call Center Fraud Can Teach Us about Insider Threats July 23, 2019
- Counter Today’s Cyber Threats with Actionable Threat Intelligence July 23, 2019
- Risk Technology Awards 2019: Making Machines More Helpful July 18, 2019
- Sprint Customers Victim of Another Hack July 18, 2019
- Sprint Data Breach Highlights “Importance of Third-Party Risk Assurance” July 17, 2019
- The Evolution of Cybersecurity: Unconventional Controls Reinforce Successful Security Programs July 15, 2019
- Experts Views On ICO Fines For BA And Marriott Data Breach July 11, 2019
- British Airways fined a staggering £183.39m under GDPR for suffering massive breach July 9, 2019
- Insider attacks still far more difficult to detect and prevent than external cyber attacks July 8, 2019
- One in 10 IT Pros Would Steal Data if Leaving a Job July 8, 2019
- Gurucul is Named a Representative Vendor in Gartner 2019 Market Guide for Online Fraud Detection July 8, 2019
- Fraud Getting Harder to Detect July 4, 2019
- 1 in 10 tech employees plan to steal company information before leaving a job July 3, 2019
- ABCs of UEBA: I is for Insider Threat July 2, 2019
- Gurucul Cited for Insider Threat Defense & Fraud Prevention July 2, 2019
- 1 In 10 People Admit They Would Take Company Information When Leaving a Job July 1, 2019
- Lack of cyber training leaving employees vulnerable to phishing attacks June 28, 2019
- Espionage Campaign Steals Massive Amounts Of Data From Cell Network Providers June 27, 2019
- Different Insider Threat Personas and How To Detect Them June 27, 2019
- Gurucul Named Cyber Risk/Security Product of the Year by Risk Magazine June 27, 2019
- Security by Sector: Construction Industry “Most Vulnerable” to Phishing Scams June 26, 2019
- Gurucul is Named a Vendor to Watch for Insider Threat Defense in Gartner Market Trends Report June 26, 2019
- ABCs of UEBA: H is for Hijacking June 24, 2019
- 11 Tips For Teaching Your Company’s Employees Good Cybersecurity Habits June 21, 2019
- Travel Tips to Keep You Safe from Cybercrime, Fraud & Identity Theft June 19, 2019
- Zero-trust security model means more than freedom from doubt June 17, 2019
- How Will AI Impact Society In The Next Decade? 11 Tech Pros Weigh In June 12, 2019
- What is Big Data? June 10, 2019
- 20 Top UEBA Vendors June 4, 2019
- How Many Reports Does It Take to Make Sense of Your Data? May 25, 2019
- How to Secure Future Elections May 14, 2019
- ABCs of UEBA: G is for Gurucul May 11, 2019
- ABCs of UEBA: F is for Fraud May 6, 2019
- The Gurucul Customer Experience – In Their Own Words May 6, 2019
- More Cowbell Baby! April 30, 2019
- Security: The Never-Ending Battle in a CISO’s life April 29, 2019
- ABCs of UEBA: E is for Entity April 22, 2019
- Wipro security incident underscores MSP vulnerability April 19, 2019
- Security Roundup: BYOD, Wipro Attack, Okta-Evident ID, IoT Security April 18, 2019
- Manufacturing sector most vulnerable to insider threats April 15, 2019
- Insider Threat Survey Report: RSA 2019 April 14, 2019
- RSA Attendees Confirm They are Vulnerable to Insider Threats April 11, 2019
- Why IT pros fear employee error, not hackers, will cause the most breaches April 11, 2019
- Over 70% of Companies Vulnerable to Insider Threats – Gurucul April 11, 2019
- Nearly 75% of RSA Attendees Surveyed Said They are Vulnerable to Insider Threats April 11, 2019
- Look At Risk as More of a Compass Than a Watch April 9, 2019
- A Five-Step Process for Mitigating External or Insider Risk April 9, 2019
- Gurucul Shortlisted for Best Behavior Analytics/Enterprise Threat Detection in SC Awards Europe 2019 March 27, 2019
- The College Admissions Scandal: Dethroning Privilege March 25, 2019
- ABCs of UEBA: D is for Data March 18, 2019
- Insiders are biggest security problem for companies today: Cyber security expert March 14, 2019
- A Nut Worth Cracking March 11, 2019
- Gurucul Risk Analytics 7.0 Uses Machine Learning Models for Real-Time Threat Detection March 6, 2019
- The Role of Analytics in Protecting Healthcare Data Privacy and Security February 27, 2019
- Gurucul Extends Behavior Based Security Analytics to Entire IT Stack Enabling Real-time Automation of AI/ML Driven Security Controls February 27, 2019
- Join Gurucul at RSA Conference 2019 in San Francisco February 22, 2019
- Gurucul Reports Record Growth in 2018 February 21, 2019
- What is Machine Learning? February 19, 2019
- ABCs of UEBA: C is for Context February 14, 2019
- ABCs of UEBA: B is for Behavior February 4, 2019
- You’re Paying Too Much for Your SIEM January 31, 2019
- ABCs of UEBA: A is for Analytics January 23, 2019
- Why Fraud Detection Needs A Reboot January 17, 2019
- Detect Merchant Fraud with “Outlier Categorical Model” January 14, 2019
- Fraud Analytics Can Help Prevent Fraud that Uses the Rails of SWIFT January 9, 2019
- Protect Classified Information with “Identity Classification” January 8, 2019
- Top 10 Blog Posts of 2018 January 2, 2019
- Real-time behaviour based security analytics forms the core of Gurucul January 2, 2019
2018
- Is Behaviour Analytics a Panacea to Security Challenges December 28, 2018
- The Incident Response Army is Rapidly Growing December 27, 2018
- How Do We Detect Insider Threats? December 20, 2018
- What is an ‘Insider Threat’ and How Do We Detect Them? December 19, 2018
- Embracing Risk Management Elevates Security Pros to Business Leaders. Why do they still find it so difficult? December 19, 2018
- Future cyber attacks to be Artificial Intelligence-driven: Expert December 19, 2018
- Get control of call center fraud with machine learning and analytics December 14, 2018
- Fraudsters are Banks Chief Competition December 10, 2018
- Streamline Investigations with “Link Analysis” December 1, 2018
- Behavior Analytics and Model Driven Security November 30, 2018
- The Evolution of the Cyber Threat Landscape – Security and Fraud Management November 29, 2018
- Gurucul Wins Platinum 2018 ASTORS Homeland Security Award November 26, 2018
- Revamping Authentication With Automation and ML November 20, 2018
- Identify Good UEBA Data with “Feature Analysis” November 15, 2018
- Data Democracy Shines in the Wake of the Cloudera and Hortonworks Merger November 8, 2018
- CELEBRATE Winners & Finalists at the NYC 2018 ‘ASTORS’ Awards Luncheon – American Security Today November 2, 2018
- Thwart Money Laundering with “Dimensionality Reduction” October 31, 2018
- Gurucul Customer Allina Health Recognized with 2019 CSO50 Award for Patient Data Privacy Project During Super Bowl LII October 31, 2018
- Global Risk Analytics Market October 28, 2018
- WEBINAR: Automating Security Controls Using Models and Security Orchestration October 25, 2018
- How science can fight insider threats October 25, 2018
- Aetna Gurucul Customer Story: Model Driven Security October 22, 2018
- Prevent Fraud with “Rare and Volume Based Analytics” October 16, 2018
- Stop Fileless Malware with “Abnormal PowerShell Command Execution” October 11, 2018
- Securing connected medical devices: Will categorizing them as ICS help? October 10, 2018
- Identify Outlier Access with “Clustering and K-Means” October 4, 2018
- Halt, who goes there? Identity access management October 3, 2018
- 6 Reasons Why SIEMs Aren’t A Security Analytics Tool October 2, 2018
- How Do You Establish Credibility? October 2, 2018
- Dynamic Provisioning: “Workflow Classification Regression Tree” September 28, 2018
- Gurucul Named a Strong Performer for Security Analytics by Independent Research Firm September 24, 2018
- Detect Host Compromise with “Domains Generated Algorithmically” September 20, 2018
- How Digital Transformation can Save Cybersecurity September 17, 2018
- Gurucul Introduces Managed Security Analytics Service September 12, 2018
- Detect Privileged Access Abuse with “Linear Regression” September 11, 2018
- Gurucul CEO Named Thought Leader of the Year by SC Media September 6, 2018
- Discover Privileged Accounts with “Entitlement Classification” September 5, 2018
- Saryu Nayyar Named Finalist for the 2018 Women of Influence Awards August 30, 2018
- Pinpoint Departing Users with “Predictive Flight Risk” August 30, 2018
- Security Analytics is not a SIEM August 29, 2018
- Thought Leader – Saryu Nayyar August 23, 2018
- Detect Insider Threats with “Email Fuzzy Logic” August 22, 2018
- A Q&A With Our CEO About Insider Threats in Cyber Security August 21, 2018
- Saryu Nayyar Speaks with ASIS TV at Black Hat USA 2018 August 16, 2018
- PRODUCT REVIEW: Gurucul Risk Analytics August 8, 2018
- Machine Learning Madness at Black Hat USA! August 3, 2018
- 6 Ways to Tell an Insider Has Gone Rogue July 23, 2018
- Top Executives Share Insights on Implementing Secure Next-Generation Technology in New Book July 17, 2018
- Are You Struggling with Thousands of DLP Events Per Day? July 16, 2018
- Staying secure as the IoT tsunami hits July 13, 2018
- Behavior Analytics Drive Preventative Controls without Causing Undue Business Impact July 3, 2018
- 125+ cybersecurity companies in healthcare to know | 2018 July 2, 2018
- Tesla saboteur trains spotlight on insider threats July 2, 2018
- The Daily Briefing July 2, 2018
- Identity Analytics Use Case: Dynamic Provisioning June 15, 2018
- The time for network behavior analytics has come June 9, 2018
- It’s A Hybrid World After All. How Do We Secure It? June 9, 2018
- Gurucul Recognized as Representative Vendor for Fraud Analytics in Recent Gartner Market Guide Report June 6, 2018
- The Challenges of Extracting Critical Security Data from SIEMs June 5, 2018
- AI Is Taking Over Our Lives – When Will It Arrive In Cybersecurity? June 4, 2018
- Behavior Doesn’t Lie: NH-ISAC and Model Driven Security in Healthcare May 31, 2018
- Gurucul Wins 2018 Fortress Cyber Security Award May 30, 2018
- The Biggest Cyber Threats Keeping Healthcare Executives Up at Night May 29, 2018
- Gurucul Fraud Analytics Solutions Monitors User and Entity Behaviors Across Multiple Channels to Prevent Advanced Attacks May 16, 2018
- Gurucul Wins 2018 InfoSec Award at RSA Conference April 26, 2018
- Allina Health Gurucul Customer Story: Protecting Patient Privacy April 25, 2018
- Gurucul CEO to Unveil Second Edition of Borderless Behavior Analytics at RSA Conference 2018 April 13, 2018
- Cross-channel fraud detection April 13, 2018
- Announcing the Second Edition of Borderless Behavior Analytics April 6, 2018
- Two Gurucul Customers Win 2018 CSO50 Awards for User Behavior Analytics Projects March 20, 2018
- The Rising Need for Automated Risk Response & Security Analytics February 9, 2018
- When Rules Don’t Apply January 17, 2018
- Meltdown & Spectre – Nearly Every Computer and Device at Risk January 8, 2018
2017
- Passwords Becoming a Thing of the Past December 20, 2017
- Preparing for EU GDPR: The Steps to Readiness December 6, 2017
- Gurucul CSSO Named IT Security and Strategy Officer of the Year December 6, 2017
- 6 steps for GDPR compliance December 5, 2017
- Gurucul Selected by United States Federal Government for Predictive Security Analytics utilizing User Behavior and Identity Analytics November 20, 2017
- Women in Cybersecurity: Things are changing… slowly November 9, 2017
- EU GDPR: A Reality Check on Non-Compliance Penalties (Part 2/3) November 7, 2017
- Gurucul CEO Named 2017 EY Entrepreneurial Winning Woman October 30, 2017
- Advanced Analytics + Frictionless Security: What CISOs Need to Know October 26, 2017
- EU GDPR & Advanced Security Analytics Solution (1/3) October 25, 2017
- SEC Breach and Warnings of Security Vulnerabilities October 16, 2017
- BT Bilgi Teknolojileri – Gurucul Announce Partnership for a New Approach to Data Security October 12, 2017
- The Equifax Breach: Implications of a Tipping Point Event September 14, 2017
- Gurucul Joins VMware Mobile Security Alliance September 12, 2017
- Using Identity to Protect the Mobile Perimeter September 12, 2017
- Cybersecurity Innovation in the Public and Private Sectors August 9, 2017
- Aetna Adds Behavior-Based Security to Customer Application July 18, 2017
- What can machine learning tell us? July 6, 2017
- The Role Of Machine Learning In Predictive Security June 30, 2017
- Can Health Care Trust Its Security Practices? June 21, 2017
- Gurucul Expands to Asia Pacific to Meet Growing Demand in Region June 21, 2017
- Gartner Security & Risk Management 2017 Opening Keynote Highlights June 16, 2017
- Insider Threat Detection in a Borderless World June 14, 2017
- Gurucul Supports Open Choice for UEBA Data Lakes June 14, 2017
- Why Compromised Identities Are IT’s Fault June 8, 2017
- A step ahead – This year’s CSO50 winners are designing security to stay in front of modern threats May 3, 2017
- What’s a ‘hyper-hybrid environment’ and what’re the security requirements? April 27, 2017
- You can steal my identity, but not my behavior April 20, 2017
- Horizontal Planes for Big Data and Identity Intersect Vertical Solution Silos April 13, 2017
- Why did Machine Learning Arrive Late to Predictive Security Analytics? April 4, 2017
- Gurucul CSSO to Discuss Role of Self Audits in Detecting Account Compromise at InfoSec World 2017 March 29, 2017
- Old Versus the New Strategies in Security Solution Adoption March 24, 2017
- The Identity Threat March 22, 2017
- Security Gaps in Access Management March 15, 2017
- Gurucul Named Coolest Threat Detection Vendor for 2017 by CRN March 9, 2017
- Predictive Security Analytics Use Cases March 1, 2017
- Book by Leading US Chief Security Officers on Identity as Primary Source of Cyber Attacks Now Available for Kindle App March 1, 2017
- What is the Threat Surface Equation? February 24, 2017
- Why Identity Has Become A Top Concern For CSOs February 21, 2017
- Beyond Risk Scoring February 14, 2017
- Debut of “Borderless Behavior Analytics” at RSA 2017 Conference February 14, 2017
- Gurucul Named Best User Behavior Analytics Solution for 2017 by Cyber Defense Magazine February 13, 2017
- The Vanishing Security Perimeter February 9, 2017
- Have you seen her resume? 12 amazing women in security February 8, 2017
- RSA Conference – Announcing a new BOOK “Borderless Behavior Analytics – Who’s Inside? What’re They Doing?” February 7, 2017
- Leading US Chief Security Officers Discuss Emergence of Identity as the Primary Source of Cyber Attacks in New Book February 2, 2017
- Sallie Mae Recognized for Cyber Security Management Practices January 25, 2017
- Join Gurucul at RSA in San Francisco this February January 17, 2017
- Gurucul Wins 2016 Homeland Security Platinum Award for Cyber Excellence January 5, 2017
2016
- Government Security News announces Winners and Finalists in the 2016 Homeland Security Awards Program December 21, 2016
- Gurucul Acknowledged as a Representative Vendor in Gartner Market Guide for UEBA December 19, 2016
- Machine Learning Proves Key to Privileged Account Protection December 14, 2016
- Bridging the CIO and CISO Divide December 8, 2016
- Gurucul CEO Named Female Entrepreneur of the Year December 1, 2016
- Gurucul Discovery Eliminates Privileged Access Blind Spots November 29, 2016
- 17+ Female Founders & CEOs in Cybersecurity November 20, 2016
- Gurucul Hybrid Behavior Analytics and DLP Models Detect Threats Across Cloud and On-Premises Infrastructures November 15, 2016
- Intel Security Innovation Alliance Partner Ecosystem Delivers Integrated Security to Defend Against New, Sophisticated Cyberattacks November 3, 2016
- Gurucul STUDIO™ Enables IT Security Teams to Build Custom Machine Learning Models that Detect User & Entity based Threats and Risks October 25, 2016
- NSA Contractor Suspected for Stealing Classified Data October 19, 2016
- Pain in the PAM October 14, 2016
- Mission Critical Security Risk Analytics Needs in Federal Agencies September 29, 2016
- Mandates drive EMR/EHR, now IAM needs Identity Analytics September 1, 2016
- Gurucul Risk Analytics in AST Homeland Security Awards (Video) August 31, 2016
- How data science fights modern insider threats August 25, 2016
- Gartner Catalyst San Diego Highlights August 23, 2016
- What is the CIO and CISO’s Worst Kept Secret? August 16, 2016
- Security by the People August 9, 2016
- Gurucul Integrates with Okta to Detect and Respond to Cloud Access- and Identity-based Security Threats July 27, 2016
- The 10 Coolest Security Startups Of 2016 (So Far) July 12, 2016
- The Blind Spot Between The Cloud & The Data Center June 28, 2016
- Gurucul Extends Cloud Security User Behavior Analytics Platform to Protect Microsoft Office 365 June 22, 2016
- Gurucul Named Best Behavior Analytics | Enterprise Threat Detection Platform in SC Awards Europe 2016 June 9, 2016
- Gurucul Introduces INSIDER Channel Partner Program June 1, 2016
- Detecting low and slow insider threats May 30, 2016
- NH/A-ISAC Spring Event Highlights from Florida May 17, 2016
- Gurucul Names Steve Moscarelli Vice President of Sales to Tap Fast Growing Market for Identity-based Security May 12, 2016
- The Solution to Combat System Breaches May 9, 2016
- Were Panama Papers Leaked By An Insider? April 25, 2016
- Machine Learning and Social Engineering Attacks April 21, 2016
- Machine Learning is Reshaping Security March 25, 2016
- Federal Highlights from RSA 2016 March 23, 2016
- Gurucul Appoints Beau Hutto Vice President of Federal Sales March 15, 2016
- Verizon Data Breach Digest – Surfaces Identity Misuse March 14, 2016
- Gurucul Recognized for Best Behavior Analytics Platform at SC Magazine 2016 Trust Awards March 8, 2016
- Gurucul Wins Three Cyber Security Awards at RSA 2016 February 29, 2016
- Former CIO of US Department of Defense to Discuss Identity as an Attack Vector at RSA Conference 2016 February 25, 2016
- Cyber Threat Defense Report (CDR) 2016 Highlights February 18, 2016
- 76 Percent Of Organizations Breached In 2015, Finds ‘2016 Cyber Threat Defense Report’ February 18, 2016
- KuppingerCole Recognizes Gurucul for User Behavior Analytics Approach to Threat Detection February 16, 2016
- Time to Consider User Behavior Analytics (UBA) January 25, 2016
2015
- Gurucul’s Hybrid Behavior Analytics Bridges Cloud, Enterprise Security December 21, 2015
- Gurucul HBA Protects Both On-Premises and Cloud Enterprise Apps from Identity-based Attacks December 16, 2015
- Cloud blurs personal and corporate identities December 15, 2015
- Identity – Dictionary.com’s 2015 Word of the Year December 15, 2015
- Advice to a new CISO December 15, 2015
- Gurucul Named Finalist for Best Behavior Analytics Platform in SC Magazine 2016 Trust Awards December 14, 2015
- How are directories and identity management changing December 7, 2015
- Learning Some Machine Learning While Learning From It December 1, 2015
- Importance of behavior & predictive security analytics December 1, 2015
- Phishing attacks, compromised credentials, & identity access November 4, 2015
- Highlights from FS-ISAC (Fall 2015) San Diego, CA November 2, 2015
- Gurucul CEO to Discuss the Role of Identity in Recent Breaches at Cyber Security World 2015 October 29, 2015
- Where can I find more about User Behavior Analytics? October 28, 2015
- Gurucul and Online Payments Firm to Discuss Cyber Fraud Prevention and User Behavior Analytics at FS-ISAC Fall Summit October 28, 2015
- How are perimeter and ‘protect & detect’ defenses changing? October 26, 2015
- WikiLeaks Posts CIA Director’s Personal Info October 22, 2015
- Why we need behavior-centric detection and response October 16, 2015
- Gurucul Wins SINET 16 Innovator Competition for Second Consecutive Year October 6, 2015
- Gurucul Expands to EMEA to Meet Growing Global Demand for User Behavior Analytics October 1, 2015
- Gurucul Meets All Primary Domain & Use Cases in Market Guide for User Entity Behavior Analytics by Gartner September 30, 2015
- How important is identity as a threat plane? September 25, 2015
- Identity theft in the enterprise September 15, 2015
- User behavior and inside threat detection August 18, 2015
- Gurucul Adds ID Theft Protection to User Behavior Analytics Platform August 4, 2015
- Gurucul’s Predictive Security Analytics Solution August 3, 2015
- Gurucul Appoints Security Veteran Vice President of Marketing July 28, 2015
- What & When Problems arise in Big organizations? July 27, 2015
- Product Review Gurucul Risk Analytics July 1, 2015
- The Snowden Fallout: Two Years Later May 19, 2015
- Gurucul Earns Gold for Fraud Prevention in Global Excellence Awards May 11, 2015
- Behavioral Analytics vs. the Rogue Insider May 11, 2015
- Gurucul Garners Two Awards in Third Annual Cyber Defense Magazine Competition April 29, 2015
- Identity as an Attack Surface April 28, 2015
- The Executive Cyber Security Order: Mixed Message or Meaningful Policy? April 28, 2015
- Gurucul identifies cloud threats based on identity, behaviors April 18, 2015
- Gurucul Introduces Identity-based Threat Detection for Cloud Applications April 16, 2015
- Gurucul Wins Most Valuable Product Award for Identity-based Threat Detection and Deterrence from Computer Technology Review April 6, 2015
- Detecting advanced threats with user behavior analytics March 31, 2015
- Advice to CSO’s: Have a sense of humour March 30, 2015
- What Security Pros can learn from Germanwings Flight 9525 March 30, 2015
- Gurucul Expands Identity-based Threat Detection and Deterrence Software Suite March 26, 2015
- Startup Spotlight: Gurucul’s Risk Analytics March 12, 2015
- Gurucul CSO to Discuss Insider Threat Detection Challenges at INTERZONE Conference March 4, 2015
- Why Security Awareness Alone Won’t Stop Hackers March 3, 2015
- 5 Lessons Learned from Anthem Data Breach February 20, 2015
- Do you think all healthcare insurers are safe? February 6, 2015
- Gurucul Adds Renee Guttmann to Executive Advisory Board January 21, 2015
2014
- Teri Takai, CIO of Meridian Health and Former DOD CIO, Joins Gurucul’s Impressive Advisory Board November 24, 2014
- Gurucul is Named a Top Emerging Cybersecurity Company by SINET November 17, 2014
- Getting Started with Predictive Security Analytics October 15, 2014
- What your SIEM isn’t Telling you – Discover Risk Analytics September 9, 2014
- Gartner Recognizes Gurucul as a Key Vendor in 2014 Market Guide for User Behavior Analytics September 9, 2014
- 2014 Black Hat – What a Week! August 8, 2014
- Gurucul Announces Executive Advisory Board, Stacked With Industry Leaders July 30, 2014
- Gurucul Wins Gold to Cap a Three Award Night at the 2014 NPG Hot Companies and Best Products Awards June 24, 2014
- Gurucul Recognized as a Gartner “Cool Vendor” May 13, 2014
- Gurucul Joins McAfee Security Innovation Alliance February 25, 2014
- Gurucul at RSA 2014 – “Security by and for the people!” February 24, 2014
2013
- Former Juniper CISO, Leslie Lambert Joins Gurucul as the Chief Strategy Officer May 11, 2013
- Gurucul Named Finalist in the 2013 Hot Companies and Best Products Awards by Network Products Guide April 30, 2013
- Gurucul Honored as Silver Winner in 9th Annual 2013 Security Industry’s Global Excellence Award March 20, 2013
- Gurucul Identity-Centric Behavioral Risk Intelligence Platform Named Award Finalist January 21, 2013