Always Secure the Money – SWIFT Financial Security

Always Secure the Money – SWIFT Financial Security

SWIFT is the primary method by which banks and financial institutions around the globe move money between one another. Swift has been in existence for over 40 years, and has had its share of high-profile security issues. As a consequence, SWIFT has been at the forefront of developing security and...

Insider Threat – Is your organization at risk?

With the ongoing pandemic, companies have increasingly adopted work from home policies for most of their employees, contractors, suppliers, and partners. This digital transformation provides the flexibility to work from anywhere, but it doesn’t come without a risk. Insider threats are a looming security concern for many organizations today. Insider...

Next-Gen SIEM: Migrate to a new normal

Stepping up to the next generation Moving away from tradition is never easy. Sure, things are difficult when you stick to legacy technology. For example, it requires more manual work and the analysts to run it. But it’s a known quantity. It’s comfortable and familiar. And it’s what you are...

Partner Profiles – Think|Stack

In mid-2019 Securonix started a significant investment in its partner program – this includes both VARs and MSSPs that have chosen to make the Securonix Security Operations and Analytics Platform the heart of their companies’ operations. As part of an occasional series, Partner Profiles, we thought we would share with...

Erasing for Safety: General Data Protection Regulation (GDPR)

By: Sujay Doshi, Senior Product Manager for Cyber Threat Content Abhishek RVRK Sharma, Senior Technical Marketing Engineer   (Image source: Pixabay.com) “You’ve just been erased,” said John Kruger (Arnold Schwarzenegger) to Lee Cullen (Vanessa Williams) as he made her part of the Witness Security Protection Program (Eraser (1996)). According to...

What is UEBA? Six Essential Features of User and Entity Behavior Analytics

User and Entity Behavior Analytics (UEBA) offers mature cloud, SaaS, and on-premises behavior analytics of security data from SIEMs, the cloud, and security products. It works by expanding users to include entities such as machines and internet addresses. UEBA monitors these users' interactions with data, systems, and applications to define...

Securonix Threat Research: Securing Your Remote Workforce – Detecting Teleconferencing Tools Attacks in the Work-From-Home (WFH) World – Part 2

By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team Updated June 8, 2020   Figure 1: Remote Work/Teleconferencing Tools (Zoom) UNC Path Vulnerability Exploitation - I   The Securonix Threat Research team has recently been observing a number of new attacks/security issues reported involving different remote workforce teleconferencing...

Securonix COVID-19 Cyber Threat Update – May 6, 2020

Securonix observes a significant uptick in phishing, business email compromise, and data compromise attacks.   By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team   The Securonix “COVID-19 Work From Home” task force continues to research the cyber security challenges organizations are facing during this pandemic. In this...