How to detect an insider threat – September 18, 2014 @ 5:17 pm

“With external threats, you set up a firewall and it’s easy to block a user’s IP,” said Tanuj Gulati, CTO at Securonix. With an internal threat, “The confidence level has to be extremely high. You can’t just knock on someone’s door and accuse them.”

» Continue reading

Attacks Mostly Undetected Until Too Late – September 2, 2014 @ 7:37 pm

The attackers have the advantage in that they get to choose who to attack, what resources to go after, how and when. Companies are using static defenses against these attacks and can’t predict where the next attack will come from and what the attackers will try to go after.

» Continue reading

Snowden Blows NSA’s MonsterMind – August 14, 2014 @ 5:24 pm

“Automated responses usually have a limited set of [issues] they can respond to,” David Swift, chief architect at Securonix, told TechNewsWorld. “Zero-day malware by definition is unknown, and an automated response to an unknown attack without human analysis is a recipe for denial of service.”

» Continue reading

Snowden leaks prompt firms to focus cyber security on insider threats – August 11, 2014 @ 12:26 am

Chris Inglis, who helps corporations guard against threats as an advisor for data security firm Securonix, said in an interview with The Times that the Snowden leaks have been good for business.

» Continue reading

Security experts call for action against cyber threats – August 11, 2014 @ 12:21 am

Chris Inglis, who retired this year as deputy director of the National Security Agency, said disaster could be creeping instead of sudden, as broad swaths of data become unreliable.
In an interview, he said some of Geer’s ideas, including product liability, deserved broader discussion.
“Doing nothing at all is a worse answer,” said Inglis, who now advises security firm Securonix.

» Continue reading

Russian gang stole 1.2 billion Net passwords – August 7, 2014 @ 5:27 pm

The size of the operation shouldn’t come as a surprise to anyone, Maiffret said. “In the past, when people thought of hacking, they thought of a lone teen-aged hacker sitting in the basement,” he said. “But people need to realize that most hacking today is related to organized crime.”
Even large companies need to acknowledge that modern-day hackers are likely “much better funded than they are,” said security expert Sharon Vardi, who is the chief marketing officer of Securonix. “They are backed by millions of dollars to get the job done,” he said.

» Continue reading

Securonix Releases Industry’s First Enterprise Class Real-time Security Analytics Platform at Black Hat 2014 – August 7, 2014 @ 5:24 pm

New Release Delivers Real-time Signature-less Security Analytics at Scale Across Network Devices, Applications, Databases, User Activities and Hosts for Advanced Threat Detection Against Insiders and Cyber Security Attacks LOS ANGELES and LAS VEGAS, August 6, 2014 — Securonix LLC, the …

» Continue reading

JOIN SECURONIX TEAM AT BLACKHAT! – August 5, 2014 @ 1:26 pm

Come meet with Securonix Experts at booth #919 and explore the latest in security analytics technology.  Over 30 people including senior management from Securonix will be available to demonstrate Security Analytics use cases and discuss customer case studies around Cyber Intelligence, Data …

» Continue reading

Assume the Worst – Hackers Will Get In – July 31, 2014 @ 8:37 pm

A determined attacker will get in. Many networks are already compromised. Despite spending fortunes on perimeter and anti-malware defense attackers get into some of the best defended, highest budget, highest profile networks, like Sony, Target, Epsilon, Experian and more.

» Continue reading

Burned By Snowden, Former NSA Official Now Helps Finance Industry Avoid ‘Insider Threats’ – July 8, 2014 @ 5:30 pm

But now he’s moving onto the next chapter of his life with three new positions: strategic adviser for a Los Angeles-based technology company, Securonix, which develops algorithms to detect insider threats; venture partner at the Paladin Capital Group, which invests in cybersecurity technologies; and teaching computer science at the U.S. Naval Academy in Annapolis, Maryland.

» Continue reading