Equifax – The Mother Of All Breaches

Equifax – The Mother Of All Breaches

The Equifax data breach that rocked the cyber security industry yesterday is not just another data breach, it’s the mother of all breaches. This is not because of its sheer size - the number of people affected exceeds the working age population of the United States. We have, unfortunately, seen bigger...

Adding Spark to Accelerate Security Management

Written By David O'Hara, Security Engineer at Securonix Many organizations today are faced with a common challenge when handling potential threats within their environments, and that is the time to execute various security management steps from detection to resolution. The security management process in most organizations involves at least 3...

Leverage Machine Learning For Cybersecurity

We have firewalls, IPS, endpoint protection, DLP, SIEM and we still continue to get breached. The average breach to detection time is over 220 days, far too long. We are collecting the necessary information to do better than that. Pick any of the breaches over the last few years and...

Seven Reasons To Replace Your Legacy SIEM with Security Analytics

Like it or not, your SIEM deployment is actually preventing you from succeeding in your daily cyber security battle. You adversaries are using techniques your SIEM can’t detect, across device types that SIEMs weren’t built to handle, and most importantly the greatest threat actor already has access to organizational IT...

Securonix CISO Michael Lipinski Contributes to ICIT’s Anthology, “Next Generation Defenses for a Hyper Evolving Threat Landscape”

Michael Lipinski, Securonix CISO, chief security strategist and Institute for Critical Infrastructure Technology (ICIT) fellow, contributed the following essay to an anthology published by ICIT highlighting next-gen defenses in the new and evolving threat landscape. Protecting the Data – The Final Battle? Can Behavior Analytics Technology be the Answer? By...

Intellectual Property Protection Using Securonix Security Analytics

"Without Securonix we never would have found this!" Typical Big Data Security Analytics deployments of the Securonix SNYPR solution are for use cases such as insider threat detection, data exfiltration, privileged account misuse and external cyber threats. The trusted insider accessing and downloading files that they’ve never accessed before or...