Behavior Analytics takes center stage in DC

Behavior Analytics takes center stage in DC

Securonix was recently invited as an ICIT fellow and industry leader to participate in an advisory meeting with senate staffers on the benefits of Behavior Analytics and to help describe the extensive ways in which it can be leveraged for insider and cyber threat detection and risk reduction. As we...

A Case of Corporate Espionage

In May of 2015, two employees were accused of stealing trade secrets from two U.S tech companies named Avago and Skyworks. The attackers collaborated for years on how to obtain the data needed to stand up their own company in China to compete in the billion dollars a year business....

Security Analytics - Looking Beyond the Buzzwords

As new security breaches continue to be identified at big-name companies, “cyber” buzzwords keep coming up in everyday discussions. Terms such as “APT”, “Spear Phishing", “Cyber Kill Chain” and “Advanced Malware” have become major talking points. Security companies are coming up with solutions that provide advanced threat intelligence, machine learning...

Cyber Security Gets Physical

Security analytics applied to SCADA devices can detect changes in pressure, temperature or flow that indicate a valve is 3X hotter than any other valve with 3X the pressure, and is about to blow. Applied to medical devices like Pyxis pharmacy dispensing applications, analytics can detect a clinician withdrawing a...

Golden Triangle of Cyber Defense

  New CompTIA study Trends in Information Security highlights growing complexity of security environment that challenges even the best prepared businesses. Organizations have to match the pace of technology changes (cloud computing, mobile technologies) to stay competitive, expand the scope of their security programs to reduce attack surface ballooning due to these...

Re: The Rise of Non-Deterministic Security

Anton Chuvakin wrote a great blog about the future of machine-learning in cyber-security. Alex Vaystikh wrote a great commentary on Anton's post. I followed Alex's lead and posted my comment to his comment in this blog... I'd argue though that "confidence" is not a politically-correct from of "correctness", pardon the...

Carbanak: the common threat with disastrous effects

CARBANAC: the common man who changes into a god. "There are people in the street. I think they are hunting for Carbanac." A form raced up beside his own, the mighty body of Carbanac—Carbanac transformed into a monster, and out of whose lungs came bellowings that were like the roarings...

Analytics & Intelligence Survey

SANS recently released a sponsored report, “Analytics and Intelligence Survey 2014” by David Shackleford. I found the data interesting when read in detail, but would like to see more analysis and recommendations rather than graphs of data. I’ve followed Shackleford’s publications in the past, and this report may be more...

Anthem, it’s all about Access!

As we look for details about the recent Anthem breach, one question arises: are we spending our time and efforts on the right problem? If we analyze the few details coming out of the Anthem breach, one becomes VERY obvious to me – risky access. I’m not talking about the...

JOIN SECURONIX TEAM AT BLACKHAT!

Come meet with Securonix Experts at booth #919 and explore the latest in security analytics technology. Over 30 people including senior management from Securonix will be available to demonstrate Security Analytics use cases and discuss customer case studies around Cyber Intelligence, Data Exfiltration, High Privileged Accounts, Cloud Security Analytics, Fraud Intelligence, Identity &...