Blog

Next-Gen SIEM: Migrate to a new normal

Published on June 22, 2020

Stepping up to the next generation Moving away from tradition is never easy. Sure, things are difficult when you stick to legacy technology. For example, it requires more manual work and the analysts to run it. But it’s a known quantity. It’s comfortable and familiar. And it’s what you are...

Partner Profiles – Think|Stack

Published on June 17, 2020

In mid-2019 Securonix started a significant investment in its partner program – this includes both VARs and MSSPs that have chosen to make the Securonix Security Operations and Analytics Platform the heart of their companies’ operations. As part of an occasional series, Partner Profiles, we thought we would share with...

Erasing for Safety: General Data Protection Regulation (GDPR)

Published on May 26, 2020

By: Sujay Doshi, Senior Product Manager for Cyber Threat Content Abhishek RVRK Sharma, Senior Technical Marketing Engineer   (Image source: Pixabay.com) “You’ve just been erased,” said John Kruger (Arnold Schwarzenegger) to Lee Cullen (Vanessa Williams) as he made her part of the Witness Security Protection Program (Eraser (1996)). According to...

What is UEBA? Six Essential Features of User and Entity Behavior Analytics

Published on May 7, 2020

User and Entity Behavior Analytics (UEBA) offers mature cloud, SaaS, and on-premises behavior analytics of security data from SIEMs, the cloud, and security products. It works by expanding users to include entities such as machines and internet addresses. UEBA monitors these users' interactions with data, systems, and applications to define...

Securonix Threat Research: Securing Your Remote Workforce – Detecting Teleconferencing Tools Attacks in the Work-From-Home (WFH) World – Part 2

Published on May 6, 2020

By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team Updated June 8, 2020   Figure 1: Remote Work/Teleconferencing Tools (Zoom) UNC Path Vulnerability Exploitation - I   The Securonix Threat Research team has recently been observing a number of new attacks/security issues reported involving different remote workforce teleconferencing...

Securonix COVID-19 Cyber Threat Update – May 6, 2020

Published on May 6, 2020

Securonix observes a significant uptick in phishing, business email compromise, and data compromise attacks.   By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team   The Securonix “COVID-19 Work From Home” task force continues to research the cyber security challenges organizations are facing during this pandemic. In this...

Securonix Threat Research: Securing Your Remote Workforce – Detecting the Latest Cyberattacks in the Work-From-Home (WFH) World: Part 1

Published on April 1, 2020

By Oleg Kolesnikov, Securonix Threat Research Team   Figure 1: Malware Exploiting Live Coronavirus Map   In recent weeks, as many businesses have been rushing to institute a shift to remote work due to the COVID-19/coronavirus situation, we have been observing malicious threat actors attempting to exploit an increasing number...

What is an Insider Threat?

Published on March 26, 2020

By Abhishek RVRK Sharma, Senior Technical Marketing Engineer When the trusted becomes malicious Insider threats. You’ve surely heard the term, and how it is the most dangerous and damaging cyberthreat an enterprise can face. The US Department of Homeland Security defines an insider threat as “a current or former employee,...