Blog

3 Proactive Ways to Find Hidden Threats: SearchMore

Published on August 7, 2020

  What if the enemy is already inside? In the SecOps world, detecting and responding to threats is only half the story. Sophisticated attackers know the weaknesses of SIEM platforms and other security software and will exploit those vulnerabilities every chance they get. Threat actors know that many legacy platforms...

Always Secure the Money – SWIFT Financial Security

Published on July 17, 2020

SWIFT is the primary method by which banks and financial institutions around the globe move money between one another. Swift has been in existence for over 40 years, and has had its share of high-profile security issues. As a consequence, SWIFT has been at the forefront of developing security and...

Insider Threat – Is your organization at risk?

Published on July 16, 2020

With the ongoing pandemic, companies have increasingly adopted work from home policies for most of their employees, contractors, suppliers, and partners. This digital transformation provides the flexibility to work from anywhere, but it doesn’t come without a risk. Insider threats are a looming security concern for many organizations today. Insider...

Next-Gen SIEM: Migrate to a new normal

Published on June 22, 2020

Stepping up to the next generation Moving away from tradition is never easy. Sure, things are difficult when you stick to legacy technology. For example, it requires more manual work and the analysts to run it. But it’s a known quantity. It’s comfortable and familiar. And it’s what you are...

Partner Profiles – Think|Stack

Published on June 17, 2020

In mid-2019 Securonix started a significant investment in its partner program – this includes both VARs and MSSPs that have chosen to make the Securonix Security Operations and Analytics Platform the heart of their companies’ operations. As part of an occasional series, Partner Profiles, we thought we would share with...

Erasing for Safety: General Data Protection Regulation (GDPR)

Published on May 26, 2020

By: Sujay Doshi, Senior Product Manager for Cyber Threat Content Abhishek RVRK Sharma, Senior Technical Marketing Engineer   (Image source: Pixabay.com) “You’ve just been erased,” said John Kruger (Arnold Schwarzenegger) to Lee Cullen (Vanessa Williams) as he made her part of the Witness Security Protection Program (Eraser (1996)). According to...

What is UEBA? Six Essential Features of User and Entity Behavior Analytics

Published on May 7, 2020

User and Entity Behavior Analytics (UEBA) offers mature cloud, SaaS, and on-premises behavior analytics of security data from SIEMs, the cloud, and security products. It works by expanding users to include entities such as machines and internet addresses. UEBA monitors these users' interactions with data, systems, and applications to define...

Securonix Threat Research: Securing Your Remote Workforce – Detecting Teleconferencing Tools Attacks in the Work-From-Home (WFH) World – Part 2

Published on May 6, 2020

By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team Updated June 8, 2020   Figure 1: Remote Work/Teleconferencing Tools (Zoom) UNC Path Vulnerability Exploitation - I   The Securonix Threat Research team has recently been observing a number of new attacks/security issues reported involving different remote workforce teleconferencing...

Securonix COVID-19 Cyber Threat Update – May 6, 2020

Published on May 6, 2020

Securonix observes a significant uptick in phishing, business email compromise, and data compromise attacks.   By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team   The Securonix “COVID-19 Work From Home” task force continues to research the cyber security challenges organizations are facing during this pandemic. In this...