You can steal my identity, but not my behavior

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

04/19/17

Beyond risk scoring

Beyond risk scoring

Risk scoring is not an end in itself once it shows up color coded and normalized between 0 and 100 in a security operations center (SOC) dashboard. To provide real value it must be supplemented by a closed-loop response process that...

02/13/17

Bridging the CIO and CISO divide

Bridging the CIO and CISO divide

Why identity and access management is at the core of the gulf between these two C-suite roles.

12/07/16

Pain in the PAM

Pain in the PAM

In order to prevent security breaches, insider attacks and comply with regulatory mandates, organizations must proactively monitor and manage privileged access. As the compromise and misuse of identity is often at the core of modern...

10/11/16

Security by the people

Security by the people

Sometimes it takes a village. In the case of information security, sometimes it takes an employee. Forward thinking enterprises can go beyond simply providing IT security awareness training and hygiene tips for their users, and enlist...

08/08/16

Catching a RAT by the tail

Catching a RAT by the tail

Last month I examined how machine learning could be used to detect low and slow insider threats. In this, the final installment of my trilogy on real-world use cases from the recent Verizon Data Breach Digest, I’ll discuss how remote...

06/22/16

Detecting low and slow insider threats

Detecting low and slow insider threats

In my last post I discussed how machine learning could be used to detect phishing-based account compromise attacks using a real-world use case from the recent Verizon Data Breach Digest. This time I’ll examine how to detect insider...

05/19/16

Machine learning and social engineering attacks

Machine learning and social engineering attacks

In my last post I promised to use some real-world use cases from the recent Verizon Data Breach Digest report to illustrate potential ways that machine learning be can used to detect or prevent similar incidents in the future. For my...

04/21/16

Machine learning is reshaping security

Machine learning is reshaping security

At the recent RSA Conference it was virtually impossible to find a vendor that was not claiming to use machine learning. Both new and established companies are now touting “machine learning” as a major component of the data science...

03/23/16

Cloud blurs personal and corporate identities

Cloud blurs personal and corporate identities

When hackers posted online contact lists and other documents stolen from the AOL account of CIA Director John Brennan, they not only exposed a security breach with national security implications. They also shined a light on a glaring...

12/14/15

Why we need behavior-centric detection and response

Why we need behavior-centric detection and response

According to the Verizon 2015 Data Breach Investigations Report (DBIR), 60 percent of the time, attackers were able to compromise an organization within minutes. Meanwhile, in more than 75 percent of the cases, the average time to...

10/16/15

Identity theft in the enterprise

Identity theft in the enterprise

Identity theft, historically considered a consumer threat, is expanding its horizons. Looking for bigger game, attackers are targeting the enterprise with similar tactics used to hijack online and financial accounts belonging to...

09/15/15

What can we learn from JPMorgan’s insider breaches?

What can we learn from JPMorgan’s insider breaches?

Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on charges of stealing customer data and trying to sell it. Similar incidents have occurred multiple times at JPMC over the past few years. Upon...

07/27/15

Identity as an attack surface

Identity as an attack surface

Mobile computing, cloud apps and tele-working have effectively made the de-perimeterization of IT security a “fait accompli”. In the process, these redrawn battle lines have created new challenges for CSOs and new points of entry for...

04/27/15

Load More