What is User and Entity Behavior Analytics?
UEBA is an increasingly essential part of every security plan – but it may seem more like a buzzword than a process you actually understand. We’re here to demystify UEBA security and explain how it works.
UEBA is an increasingly essential part of every security plan – but it may seem more like a buzzword than a process you actually understand. We’re here to demystify UEBA security and explain how it works.
A selection of this week’s more interesting vulnerability disclosures and cyber security news. As this article coincides with the all out sales fest of Black Friday, I thought I would highlight a number of articles along this theme to remind everyone that while shopping online can be fun, it can also contain traps for the unwary…
In the previous post, we discussed the basics of SOAR – Security Orchestration, Automation, and Response and how it is becoming a must-have for businesses across the globe. In this post, we will continue our discussion with how an SOAR solution can help an SOC in improvising its operations. Our experts have identified the following ways in which an SOAR solution proves to be beneficial for a business...
The end of November is a busy time in the United States. On Thanksgiving, friends and family gather together to give thanks for good food, good company and good fortune. Once they’ve put away the leftovers, many Americans don their coats, head to the malls and wait in line all night. For what? Black Friday, the commencement of the Christmas shopping season.
Nowadays, high-profile security breaches continue to dominate the media headlines. This trend places an increasing number of businesses at risk. They are growing in amount and complexity while malicious hackers are actively developing new and more sophisticated forms of attacks every single day.
Segregation of duties is a fundamental information security practice. In simple terms, it means you split out important tasks between two or more people. This prevents one person getting drunk on all the power they wield, and also prevents one person from making a mistake that can have undesired consequences.
The internet of things (IoT) is changing nearly every industry. Smart devices that can collect and process data, and even make decisions based on that data, though artificial intelligence promises to disrupt business as we know it for years to come.
As noted previously—and as we all know—an organization cannot be secure until the entire workforce is engaged in reducing cyber risks. Each member of the group has the power to harm or to help, since each one has access to information systems, handles sensitive data and makes decisions every day which maintain, erode or strengthen the human “attack surface” of the organization.