Is the 'right to explanation' in Europe’s GDPR a game-changer for security analytics?

Is the 'right to explanation' in Europe’s GDPR a game-changer for security analytics?

Making major adjustments in the types of software solutions they use to analyze personal data in the wake of the General Data Protection Regulation (GDPR).

01/29/18

Why Bayesian models excel at finding rogue insiders

Why Bayesian models excel at finding rogue insiders

One case often looks very different from the next, and it is precisely this complexity and behavioral variability that makes finding insider threats so tricky.

11/20/17

User behavior analytics: separating hype from reality

User behavior analytics: separating hype from reality

UBA has already produced successes against some of the security community’s toughest challenges and will continue to evolve as time goes by.

09/26/17

Why we need more shades of gray

Why we need more shades of gray

A model-driven security analytics system that is thoughtfully designed and built would generate virtually no black-and-white answers. And that's a good thing, because the security challenges we face now and in the future will rely on...

05/24/17

Knowing when a trusted insider becomes a threat

Knowing when a trusted insider becomes a threat

The time has come to pay serious attention to new ways of identifying and preventing such insider threats early on.

04/04/17

3 security analytics approaches that don’t work (but could) — Part 2

3 security analytics approaches that don’t work (but could) — Part 2

Security analytics approaches using the strengths of Bayesian networks, machine learning and rules-based systems can be vital if they are thoughtfully built, combined and applied.

02/24/17

3 security analytics approaches that don’t work (but could) — Part 1

3 security analytics approaches that don’t work (but could) — Part 1

Bayesian networks, machine learning and rules-based systems individually don't work well. They don’t produce good results, don’t scale or are too hard to work with.

01/13/17

Building an insider threat program that works — Part 2

Building an insider threat program that works — Part 2

A world-class insider threat program must have three core characteristics: prevent insider threat events, adapt to threats and be able to scale.

10/05/16

Building an insider threat program that works – Part 1

Building an insider threat program that works – Part 1

Lessons learned from the front lines of insider threat risk management.

09/07/16

Why cyber hygiene isn't enough

Why cyber hygiene isn't enough

Organizations need to practice regular cyber hygiene for healthy outcomes. But they must also take steps to mitigate cyber risk—the most serious threats to our security.

06/22/16

Load More