Snowden Leaks Cost Nation’s Cyber Security Efforts, Former NSA Official Says

Is Your Antivirus Software Really Protecting Your Business?

"Antivirus is a good and necessary protection, but is only part of a security solution," said David Swift, principal architect at security intelligence platform Securonix. "The facts show that a determined attacker will get in, and that a vast majority of the losses are going to come from external attackers...

What is the cost of a breach and how can we prevent it?

What is the cost of a breach and how can we prevent it? The recent breach at Experian prompted a lot of press, but most of the questions being asked are all wrong. There is no magic product that can prevent all attacks. Target, Snowden, TJX, Sony…pick your favorite example,...

From the Desk of the CEO – 2014 Predictions

    January 2014 Issue The Year of Security Analytics From the Desk of the CEO 2013 Reflections and 2014 Predictions on the field of Security Analytics and Intelligence Dear Colleagues, 2013 was a watershed year for Securonix and the field of security analytics. Since getting started in this emerging...

Authentication Against Active Directory

Securonix has the ability to authenticate against a single domain. The authentication configuration are to be made to the ldap-config.properties file available in the securonix_home/conf directory. The securonix system currently authenticates against a single domain and does not support authentication against multiple domains. Make the following changes to the ldap-config.properties...

What you don’t know can most definitely hurt you

It’s always something. You might run a careful, security conscious shop. Your IT group might be completely onboard, keeping their patches current and using best practices for provisioning accounts and supporting mobile devices.  And you pay attention - you think about lost or stolen laptops, vulnerable IP Cameras and SSH key...

Using Securonix for Directory-Based Service Account Monitoring

I was recently working with one of our customers, a very large health care services and administration company, to implement the Securonix solution to solve a different kind of enterprise network security problem.  Both the information security team and the network administration people were struggling with managing and monitoring accounts...

Security Intelligence - But What Does It DO?

It seems like everybody’s talking about security intelligence these days.  Of course, what people mean when they use the term can vary widely depending upon what they’re selling, but the primary purpose remains the same.  Some kind of machine intelligence that can detect successful cyber attacks, information theft, fraud and...

"The Snowden Case", Lies and Marketing Communications on Insiders

One of the more interesting outgrowths of the recent revelations around NSA cyber-surveillance practices is the sudden declaration from all manner of information security vendors that their product or service could have “prevented Snowden”.  Now these claims are being met with a great deal of skepticism in the security community,...

Voluntary Self-Hackery -- The Blunt Truth about BYOD

In a sense, the entire discussion around BYOD processes in the enterprise is moot.  Everyone has a smart phone.  Many have found they prefer a tablet to a PC, and will bring their tablet to work.  These devices connect seamlessly to the network through WiFi, and very quickly become a...