Blog

Seven Reasons To Replace Your Legacy SIEM with Security Analytics

Published on June 24, 2017

Like it or not, your SIEM deployment is actually preventing you from succeeding in your daily cyber security battle. You adversaries are using techniques your SIEM can’t detect, across device types that SIEMs weren’t built to handle, and most importantly the greatest threat actor already has access to organizational IT...

Securonix CISO Michael Lipinski Contributes to ICIT’s Anthology, “Next Generation Defenses for a Hyper Evolving Threat Landscape”

Published on June 15, 2017

Michael Lipinski, Securonix CISO, chief security strategist and Institute for Critical Infrastructure Technology (ICIT) fellow, contributed the following essay to an anthology published by ICIT highlighting next-gen defenses in the new and evolving threat landscape. Protecting the Data – The Final Battle? Can Behavior Analytics Technology be the Answer? By...

Intellectual Property Protection Using Securonix Security Analytics

Published on May 31, 2017

"Without Securonix we never would have found this!" Typical Big Data Security Analytics deployments of the Securonix SNYPR solution are for use cases such as insider threat detection, data exfiltration, privileged account misuse and external cyber threats. The trusted insider accessing and downloading files that they’ve never accessed before or...

SNYPR Recognized as a Strong Performer in The Forrester Security Analytics Wave Report

Published on March 9, 2017

Securonix has been named a “strong performer” by the leading global research and advisory firm Forrester in The Forrester Wave™: Security Analytics Platforms, Q1 2017 Report. Forrester evaluated the Securonix platform, SNYPR, among a selection of industry leading security analytics and security incident and event management (SIEM) providers. The solutions...

Yahoo! The Cost of Silence

Published on September 29, 2016

Further Analysis of The Yahoo! Breach Continuing to follow developments in Yahoo’s recent breach, there are two things that happened since my “Yahoo! Password as a Service” post last week. The first was obvious and expected: multiple class-action lawsuits have been filed against the company. The second was expected, but...

Yahoo! Password as a Service

Published on September 23, 2016

Analyzing the Yahoo! Breach This is one Yahoo! service that Verizon definitely didn’t bargain for in its planned $4.8 billion acquisition of struggling Internet giant. You can pick from the 450,000 Yahoo Voices accounts compromised in 2012, 22,000,000 Yahoo Japan logins lost in 2013, or 500,000,000 user accounts breached in...

Identify The “Who” in Risk Mitigation

Published on June 29, 2016

When it comes to risk mitigation, organizations need to focus on several components in order to develop and implement an effective strategy to counter a diverse range of cyber threats. While there is considerable focus, and rightly so, on being able to identify mission critical information assets and accesses in...

Grandmothers, Gangsters, Guerrillas and Governments

Published on May 31, 2016

I recently flew to Knoxville Tennessee to visit Oak Ridge National Laboratory (ORNL) and deliver a talk at the 11th Annual Cyber & Information Security Research (CISR) conference. The title of my presentation and this blog – Grandmothers, Gangsters, Guerrillas and Governments – is an analysis of the four primary...

Reducing Hay to Find Needles

Published on May 31, 2016

I recently participated in a televised C-SPAN panel on counterterrorism and intelligence at the Center for Cyber and Homeland Security at George Washington University. One of the ideas we explored is an analogy that is often used in the security industry: how to “find the needle in a haystack” or...