29 Feb

GigaSecure Delivers

in Blog, Corporate, Technology

Security teams are tasked with cutting through the alert white noise produced by numerous systems in the IT infrastructure in order to quickly detect attacks and limit their impact. They must quickly investigate and remediate what they find, as cybercriminals are increasingly sophisticated and..

Read More
25 Feb

Niara Introduces Industry’s First Modular and Data-Agnostic Behavioral Analytics

in Blog, Corporate, Product

Today, Niara announced that the latest release of its security analytics platform provides modular and data-agnostic behavioral analytics. A simple statement, but one that has important consequences for the application of user behavior analytics (UBA) to cybersecurity.

Read More
11 Feb

Better Understanding Distributed Malware via Graph Analytics and Machine Learning

in Blog, Perspectives

If you read the Mandiant APT1 report or other similar high-profile analyses of long-running, targeted and highly-damaging attacks, a trend becomes very clear: threat actors target multiple organizations, in multiple verticals, over multiple years, from multiple hop-off points (sometimes from one..

Read More
01 Feb

Machine Learning and Cybersecurity: Made for Each Other

in Blog, Perspectives

In our recent webinar “Behavioral Analytics and Machine Learning: What You Need to Know”, Dr. Ankur Teredesai, Professor of Computer Science and Systems at the Center of Data Science at the University of Washington, put the spotlight on a very interesting topic: why there is such spirited..

Read More
21 Jan

Behavioral Analytics Can Mitigate the Post-Breach Impact of an Attack

in Blog, Perspectives, Technology

Cyber attacks happen regularly and make the news, despite many organizations significantly investing in cyber defenses, sometimes to the tune of 100s of millions of dollars. In the past, there was a certain malaise around these breaches, with affected companies getting a slap on the wrist,..

Read More
15 Jan

Breakin’ Up is Hard to Do – But Behavioral Analytics Makes It Easier

in Blog, Perspectives, Technology

Cybersecurity is often disappointing – but it’s not for lack of innovation. What may have previously been state-of-the-art can quickly become ineffective in an attack landscape dominated by newer, more sophisticated threats. Perimeter defenses (e.g., firewall, IDS) and security monitoring..

Read More
06 Jan

Logs Can Be Erased: The Network Matters

in Blog, Perspectives, Technology

The fallout from the Sony Pictures hack was significant, costing the studio tens of millions of dollars. Terabytes of information was stolen, most of which ended up online. At least five films were made freely available via file-sharing websites. The theatrical release of “The Interview” was..

Read More
09 Dec

The Importance of Meaningful Features in Machine Learning-Based Cyber Security

in Blog, Perspectives

We’ve published a number of blogs on the application of machine learning to security (3 Reasons Why Machine Learning is Not a Cybersecurity Pipe Dream, Your Levenshtein distance module told you something was amiss. Now what?, Machine Learning: Providing a Much Needed Assist for Cyber Security..

Read More
02 Dec

3 Reasons Why Machine Learning is Not a Cybersecurity Pipe Dream

in Blog, Perspectives, Technology

Despite much skepticism about machine learning’s role in security, customers can benefit from machine intelligence when combatting sophisticated attacks. While some believe that machine learning is the latest pipe dream for security, I think otherwise. It all depends on how machine learning is..

Read More
18 Nov

Next Generation Security Operations Centers: Machine Assisted, Human Driven

in Blog, Perspectives

We recently announced the latest release of our attack analytics and incident investigation platform that features the addition of network packet and flow data to our existing log-based user and entity behavior analytics (UEBA). We believe this delivers two critical benefits: dramatically improved..

Read More
1 ...
2 3 4 5 6
... 7