Security teams are tasked with cutting through the alert white noise produced by numerous systems in the IT infrastructure in order to quickly detect attacks and limit their impact. They must quickly investigate and remediate what they find, as cybercriminals are increasingly sophisticated and..
Today, Niara announced that the latest release of its security analytics platform provides modular and data-agnostic behavioral analytics. A simple statement, but one that has important consequences for the application of user behavior analytics (UBA) to cybersecurity.
If you read the Mandiant APT1 report or other similar high-profile analyses of long-running, targeted and highly-damaging attacks, a trend becomes very clear: threat actors target multiple organizations, in multiple verticals, over multiple years, from multiple hop-off points (sometimes from one..
In our recent webinar “Behavioral Analytics and Machine Learning: What You Need to Know”, Dr. Ankur Teredesai, Professor of Computer Science and Systems at the Center of Data Science at the University of Washington, put the spotlight on a very interesting topic: why there is such spirited..
Cyber attacks happen regularly and make the news, despite many organizations significantly investing in cyber defenses, sometimes to the tune of 100s of millions of dollars. In the past, there was a certain malaise around these breaches, with affected companies getting a slap on the wrist,..
Cybersecurity is often disappointing – but it’s not for lack of innovation. What may have previously been state-of-the-art can quickly become ineffective in an attack landscape dominated by newer, more sophisticated threats. Perimeter defenses (e.g., firewall, IDS) and security monitoring..
The fallout from the Sony Pictures hack was significant, costing the studio tens of millions of dollars. Terabytes of information was stolen, most of which ended up online. At least five films were made freely available via file-sharing websites. The theatrical release of “The Interview” was..
We’ve published a number of blogs on the application of machine learning to security (3 Reasons Why Machine Learning is Not a Cybersecurity Pipe Dream, Your Levenshtein distance module told you something was amiss. Now what?, Machine Learning: Providing a Much Needed Assist for Cyber Security..
Despite much skepticism about machine learning’s role in security, customers can benefit from machine intelligence when combatting sophisticated attacks. While some believe that machine learning is the latest pipe dream for security, I think otherwise. It all depends on how machine learning is..
We recently announced the latest release of our attack analytics and incident investigation platform that features the addition of network packet and flow data to our existing log-based user and entity behavior analytics (UEBA). We believe this delivers two critical benefits: dramatically improved..