How can SOC analysts hunt more efficiently? By not hunting

How can SOC analysts hunt more efficiently? By not hunting

To win the battle against today’s sophisticated cyber threats, security analysts must disrupt a kill chain or lateral movement attack early in the process. Achieving success requires pinpointing the real threat amidst a never-ending...

04/12/18

Traditional cyber solutions are the answer when used in the right way

Traditional cyber solutions are the answer when used in the right way

When it comes to cybersecurity, every investment counts.

03/13/18

Detecting malicious insiders: a new use case for data loss prevention
Q&A

Detecting malicious insiders: a new use case for data loss prevention

A discussion with Symantec’s Nico Popp about how DLP has evolved over the years.

02/20/18

7 insider attacks behavior analytics detects

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

01/31/18

Of clouds and compliance: DLP + UEBA are back in the spotlight

Of clouds and compliance: DLP + UEBA are back in the spotlight

Like many technologies before them that have needed to ripen on the vine for many years before accomplishing what they initially set out to do, DLP and user and entity behavior analytics now find themselves on the cusp of doing just...

01/17/18

Building an insider threat program from the inside-out, not outside-in

Building an insider threat program from the inside-out, not outside-in

Including the 10 questions you should ask when building an insider threat program.

01/03/18

From buzz to the battleground, AI is everywhere

From buzz to the battleground, AI is everywhere

An open letter to artificial intelligence.

12/13/17

Multi-factor authentication needs a little Goldilocks

Multi-factor authentication needs a little Goldilocks

Companies cannot apply multi-factor authentication to everything a user does.

11/27/17

Load More