28 Apr

Multiplying the Power of Your Security Team with Entity360

in Blog, Perspectives, Product

Over the last several years, Google search results have morphed from millions of URLs being displayed, to a split screen of URL results on the left side of the page and a summarized set of information about the search term on the right side.

Read More
20 Apr

Behavioral Analytics for Detecting Whaling, Ransomware and Other Email-Based Crime Campaigns

in Blog, Perspectives

In conjunction with Niara customers, Niara’s security research team has determined that spoofing sender domains is a primary technique used for email-borne attacks. Niara identified these attacks because of security analytics that combine user behavior analytics (e.g., an unusual number of..

Read More
05 Apr

Don't Get Stuck with Dead End UBA

in Blog, Perspectives

If you attended the recent RSA conference, you would be tempted to refer to it as the “UBA rave.” It seemed like every vendor, no matter its product, wanted to be in that space.

Read More
29 Mar

Defending Against All Insider Threats

in Blog, Industry News

I’ve been working in cybersecurity for a relatively long time, and yet, the scale of damage attributed to the insider threat never ceases to amaze me. Here at Niara, much has been written about the threat posed by compromised users (i.e., attackers posting as authorized users) and malicious..

Read More
24 Mar

Niara/Carbon Black Integration Opens Up Endpoint for User Behavior Analytics

in Blog, Corporate, Technology

If nothing else, the recent RSA Conference confirmed that user behavior analytics (UBA) is one of the hottest security markets in tech. In fact, we watched with humor as new UBA vendors magically appeared from other parts of the ecosystem to claim a piece of the pie.

Read More
16 Mar

Identifying Lateral Spread via Behavioral Analytics on Network Flows

in Blog, Perspectives, Technology

In advanced attacks, lateral spread (also known as lateral movement or east-west movement) is when cybercriminals try to increase their footprint within the organization by compromising other computers, servers, and infrastructure components. There could be multiple goals for this stage – e.g.,..

Read More
09 Mar

Encryption Alone Cannot Secure the Enterprise but Behavioral Analytics Can Help

in Blog, Perspectives, Technology

A recent Dark Reading article makes the case for encryption being the definitive technology for protecting enterprises’ data and that the proposal to “use analytics to secure your system” is flawed. I beg to differ. Encryption absolutely has a place in a robust defense in depth strategy, but to..

Read More
03 Mar

Traveling at 200,000 MPH? That’s An Anomaly Worth Investigating!

in Blog, Product

Niara’s security analytics produce credible, robust results, enabling security analysts to cut through alert white noise. That’s a good thing given the acute shortage of cybersecurity talent. Niara makes this possible by innovatively combining supervised, semi-supervised and unsupervised machine..

Read More
02 Mar

See Niara’s Integration with Splunk at RSA Conference 2016

in Blog, Product

Why should you choose Niara? It’s simple: Niara’s security analytics platform automatically detects attacks on the inside and serves as a force multiplier for security analysts, whether Niara is deployed standalone or integrated with other security components. Niara’s technology integrates with ..

Read More
01 Mar

See Niara’s Modular, Data-Agnostic Analytics in Action at RSA Conference 2016

in Blog, Product

Last week, we announced the industry’s first modular and data-agnostic behavioral analytics with our enhanced security analytics platform. This week, we are at booth number 3135 at RSA Conference 2016 showcasing our hard work and performing live demos of the Niara platform. To give you a better..

Read More
1 2 3 4 5
... 7