Equifax – The Mother Of All Data Breaches

Equifax – The Mother Of All Data Breaches

The Equifax data breach that rocked the cyber security industry yesterday is not just another data breach, it’s the mother of all data breaches. This is not because of its sheer size - the number of people affected exceeds the working age population of the United States. We have, unfortunately, seen...

Adding Spark to Accelerate Security Management

Written By David O'Hara, Security Engineer at Securonix Many organizations today are faced with a common challenge when handling potential threats within their environments, and that is the time to execute various security management steps from detection to resolution. The security management process in most organizations involves at least 3...

Leverage Machine Learning For Cybersecurity

We have firewalls, IPS, endpoint protection, DLP, SIEM and we still continue to get breached. The average breach to detection time is over 220 days, far too long. We are collecting the necessary information to do better than that. Pick any of the breaches over the last few years and...

Seven Reasons To Replace Your Legacy SIEM with Security Analytics

Like it or not, your SIEM deployment is actually preventing you from succeeding in your daily cyber security battle. You adversaries are using techniques your SIEM can’t detect, across device types that SIEMs weren’t built to handle, and most importantly the greatest threat actor already has access to organizational IT...

Intellectual Property Protection Using Securonix Security Analytics

"Without Securonix we never would have found this!" Typical Big Data Security Analytics deployments of the Securonix solution are for use cases such as insider threat detection, data exfiltration, privileged account misuse and external cyber threats. The trusted insider accessing and downloading files that they’ve never accessed before or that...