What's New in Securonix 6.3.1

What's New in Securonix 6.3.1

Have you noticed an uptick in ransomware recently? Ransomware is commonly delivered by an email that tricks users into trusting a malicious file. Many of the most recent data breaches were initiated because a user fell victim to ransomware. Threats like ransomware, which focuses on compromising the user, have more...

Threat Hunting: Do lower search costs produce better results?

Intellyx BrainBlog for Securonix by Jason English   Companies now expect to acquire security tools on a pay-as-you go, OpEx basis, and vendors who didn’t start out as managed service providers are now trying to adapt their pricing models to more flexible ones for Hybrid IT environments. Maintaining premium pricing...

3 Proactive Ways to Find Hidden Threats: SearchMore

What if the enemy is already inside? In the SecOps world, detecting and responding to threats is only half the story. Sophisticated attackers know the weaknesses of SIEM platforms and other security software and will exploit those vulnerabilities every chance they get. Threat actors know that many legacy platforms can’t...

Always Secure the Money – SWIFT Financial Security

SWIFT is the primary method by which banks and financial institutions around the globe move money between one another. Swift has been in existence for over 40 years, and has had its share of high-profile security issues. As a consequence, SWIFT has been at the forefront of developing security and...

Insider Threat – Is your organization at risk?

With the ongoing pandemic, companies have increasingly adopted work from home policies for most of their employees, contractors, suppliers, and partners. This digital transformation provides the flexibility to work from anywhere, but it doesn’t come without a risk. Insider threats are a looming security concern for many organizations today. Insider...

Next-Gen SIEM: Migrate to a new normal

Stepping up to the next generation Moving away from tradition is never easy. Sure, things are difficult when you stick to legacy technology. For example, it requires more manual work and the analysts to run it. But it’s a known quantity. It’s comfortable and familiar. And it’s what you are...

Partner Profiles – Think|Stack

In mid-2019 Securonix started a significant investment in its partner program – this includes both VARs and MSSPs that have chosen to make the Securonix Security Operations and Analytics Platform the heart of their companies’ operations. As part of an occasional series, Partner Profiles, we thought we would share with...

Erasing for Safety: General Data Protection Regulation (GDPR)

By: Sujay Doshi, Senior Product Manager for Cyber Threat Content Abhishek RVRK Sharma, Senior Technical Marketing Engineer   (Image source: Pixabay.com) “You’ve just been erased,” said John Kruger (Arnold Schwarzenegger) to Lee Cullen (Vanessa Williams) as he made her part of the Witness Security Protection Program (Eraser (1996)). According to...

What is UEBA? Six Essential Features of User and Entity Behavior Analytics

User and Entity Behavior Analytics (UEBA) offers mature cloud, SaaS, and on-premises behavior analytics of security data from SIEMs, the cloud, and security products. It works by expanding users to include entities such as machines and internet addresses. UEBA monitors these users' interactions with data, systems, and applications to define...

Securonix Threat Research: Securing Your Remote Workforce - Detecting Teleconferencing Tools Attacks in the Work-From-Home (WFH) World - Part 2

By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team Updated June 8, 2020   Figure 1: Remote Work/Teleconferencing Tools (Zoom) UNC Path Vulnerability Exploitation - I   The Securonix Threat Research team has recently been observing a number of new attacks/security issues reported involving different remote workforce teleconferencing...