Blog

Golden Triangle of Cyber Defense

Published on April 13, 2015

  New CompTIA study Trends in Information Security highlights growing complexity of security environment that challenges even the best prepared businesses. Organizations have to match the pace of technology changes (cloud computing, mobile technologies) to stay competitive, expand the scope of their security programs to reduce attack surface ballooning due to these...

Re: Who Validates Alerts Validated by Your Alert Validator Software?

Published on March 9, 2015

Another long comment inspired by Anton Chuvakin's post Who Validates Alerts Validated by Your Alert Validator Software? Using SIEM to detect multi-dimensional threats is a cyber peep show, and no matter how many peepers you throw at it, you never get a breadth and depth of the actual performance. Yes, there...

Re: The Rise of Non-Deterministic Security

Published on March 4, 2015

Anton Chuvakin wrote a great blog about the future of machine-learning in cyber-security. Alex Vaystikh wrote a great commentary on Anton's post. I followed Alex's lead and posted my comment to his comment in this blog... I'd argue though that "confidence" is not a politically-correct from of "correctness", pardon the...

Carbanak: the common threat with disastrous effects

Published on February 24, 2015

CARBANAC: the common man who changes into a god. "There are people in the street. I think they are hunting for Carbanac." A form raced up beside his own, the mighty body of Carbanac—Carbanac transformed into a monster, and out of whose lungs came bellowings that were like the roarings...

Analytics & Intelligence Survey

Published on February 23, 2015

SANS recently released a sponsored report, “Analytics and Intelligence Survey 2014” by David Shackleford. I found the data interesting when read in detail, but would like to see more analysis and recommendations rather than graphs of data. I’ve followed Shackleford’s publications in the past, and this report may be more...

Anthem, it’s all about Access!

Published on February 23, 2015

As we look for details about the recent Anthem breach, one question arises: are we spending our time and efforts on the right problem? If we analyze the few details coming out of the Anthem breach, one becomes VERY obvious to me – risky access. I’m not talking about the...

JOIN SECURONIX TEAM AT BLACKHAT!

Published on August 5, 2014

Come meet with Securonix Experts at booth #919 and explore the latest in security analytics technology. Over 30 people including senior management from Securonix will be available to demonstrate Security Analytics use cases and discuss customer case studies around Cyber Intelligence, Data Exfiltration, High Privileged Accounts, Cloud Security Analytics, Fraud Intelligence, Identity &...

Snowden Leaks Cost Nation’s Cyber Security Efforts, Former NSA Official Says

Published on June 19, 2014

The Snowden leaks “unfairly, inappropriately, unfortunately” damaged the private sector, said Chris Inglis, the former NSA deputy. Mr. Inglis made his comments Tuesday at The Wall Street Journal’s CFO Network annual meeting in Washington, D.C. Mr. Inglis retired from the NSA in January and will join Securonix’s advisory board, the...

Is Your Antivirus Software Really Protecting Your Business?

Published on June 18, 2014

"Antivirus is a good and necessary protection, but is only part of a security solution," said David Swift, principal architect at security intelligence platform Securonix. "The facts show that a determined attacker will get in, and that a vast majority of the losses are going to come from external attackers...

What is the cost of a breach and how can we prevent it?

Published on April 25, 2014

What is the cost of a breach and how can we prevent it? The recent breach at Experian prompted a lot of press, but most of the questions being asked are all wrong. There is no magic product that can prevent all attacks. Target, Snowden, TJX, Sony…pick your favorite example,...

From the Desk of the CEO – 2014 Predictions

Published on January 22, 2014

    January 2014 Issue The Year of Security Analytics From the Desk of the CEO 2013 Reflections and 2014 Predictions on the field of Security Analytics and Intelligence Dear Colleagues, 2013 was a watershed year for Securonix and the field of security analytics. Since getting started in this emerging...