User and Entity Behavior Analytics (UEBA)

November 22, 2022

Saryu Nayyar Wins 2022 Cyber Security Entrepreneur Award

Read More

Using Access Controls to Thwart Insider Threats

Access control is a big part of mitigating Insider Threats. Stop users from abusing their access and attackers from compromising credentials.

Read More

September 22, 2022

Saryu Nayyar Named Stevie Awards Finalist for Women in Business

Read More

What I Need to be a SOC Rock Star

We asked security professionals at the 2022 Black Hat USA Conference what they needed to be to be SOC Rock Stars. Read our blog for details.

Read More

September 14, 2022

Survey: Insider Threats Hard to Detect, Behavioral Analytics Key

Read More

SIEM/XDR Solutions Need to Contextualize the Attack to be Accurate

SIEM solutions or XDRs traditionally correlate events to paint a picture of the advancement of an attack campaign.

Read More

Top UEBA Use Cases to Fuel Modern, Next-Gen Security Operations

These are the top UEBA use cases that power modern, next-gen Security Operations Centers (SOCs) and accelerate threat detection.

Read More

August 10, 2022

Gurucul Next-Gen SIEM and XDR Lead Industry with Innovative Poly-Cloud and Multi-Cloud Offering

Read More

Behavior is the Leading Threat Indicator

In cybersecurity, criminals may steal an identity, but they can’t steal the behavior associated with that individual (or device).

Read More

3 Spring Cleaning Tips for Improving Cybersecurity Hygiene

It’s officially spring. That means it’s time for spring cleaning. A long-honored tradition, spring cleaning is an opportunity to do some serious cleaning. It’s not only time to cleanup your house or office, but also time to cleanup your enterprise.

Read More

Lapsus$ Group Exposes Internal Threats Are Also External Threats

The Lapsus$ Group are publicly recruiting employees of their targets to assist them in gaining access to internal networks.

Read More

You Should Be Concerned About Insider Risk

You need to know when, where and how insider risk incidents are occurring so that you can deal with them immediately, before a data breach occurs.

Read More