Blog

Securonix Threat Research: Carbanak/FIN7/Anunak Reappears, Causes Losses

Published on September 5, 2017

By Oleg Kolesnikov, Securonix Threat Research Team Introduction In August 2017, we learned of new attacks by a persistent malicious cyber threat actor known by the name of Carbanak aka FIN7 [1]. The most recent attack variants have been targeting mainly chain restaurants, hospitality, and casino industry in the US...

Adding Spark to Accelerate Security Management

Published on July 20, 2017

Written By David O'Hara, Security Engineer at Securonix Many organizations today are faced with a common challenge when handling potential threats within their environments, and that is the time to execute various security management steps from detection to resolution. The security management process in most organizations involves at least 3...

Leverage Machine Learning For Cybersecurity

Published on July 20, 2017

We have firewalls, IPS, endpoint protection, DLP, SIEM and we still continue to get breached. The average breach to detection time is over 220 days, far too long. We are collecting the necessary information to do better than that. Pick any of the breaches over the last few years and...

Seven Reasons To Replace Your Legacy SIEM with Security Analytics

Published on June 24, 2017

Like it or not, your SIEM deployment is actually preventing you from succeeding in your daily cyber security battle. You adversaries are using techniques your SIEM can’t detect, across device types that SIEMs weren’t built to handle, and most importantly the greatest threat actor already has access to organizational IT...

Protecting the Data – The Final Battle? Can Behavior Analytics Technology be the Answer?

Published on June 15, 2017

Michael Lipinski, Securonix CISO, chief security strategist and Institute for Critical Infrastructure Technology (ICIT) fellow, contributed the following essay to ICIT's Anthology, "Next Generation Defenses for a Hyper Evolving Threat Landscape" highlighting next-gen defenses in the new and evolving threat landscape. Protecting the Data – The Final Battle? Can Behavior...

Intellectual Property Protection Using Securonix Security Analytics

Published on May 31, 2017

"Without Securonix we never would have found this!" Typical Big Data Security Analytics deployments of the Securonix solution are for use cases such as insider threat detection, data exfiltration, privileged account misuse and external cyber threats. The trusted insider accessing and downloading files that they’ve never accessed before or that...

SNYPR Recognized as a Strong Performer in The Forrester Security Analytics Wave Report

Published on March 9, 2017

Securonix has been named a “strong performer” by the leading global research and advisory firm Forrester in The Forrester Wave™: Security Analytics Platforms, Q1 2017 Report. Forrester evaluated the Securonix platform, SNYPR, among a selection of industry leading security analytics and security incident and event management (SIEM) providers. The solutions...

Yahoo! The Cost of Silence

Published on September 29, 2016

Further Analysis of The Yahoo! Breach Continuing to follow developments in Yahoo’s recent breach, there are two things that happened since my “Yahoo! Password as a Service” post last week. The first was obvious and expected: multiple class-action lawsuits have been filed against the company. The second was expected, but...

Yahoo! Password as a Service

Published on September 23, 2016

Analyzing the Yahoo! Breach This is one Yahoo! service that Verizon definitely didn’t bargain for in its planned $4.8 billion acquisition of struggling Internet giant. You can pick from the 450,000 Yahoo Voices accounts compromised in 2012, 22,000,000 Yahoo Japan logins lost in 2013, or 500,000,000 user accounts breached in...