Blog

Insider Attacks Were the Most Costly Breaches of 2015

Published on October 7, 2015

Insiders pose tremendous risk to organizations, according to the most recent Ponemon Report. Malicious insiders were not the most common source of attacks last year, but they were the most costly. According to 2015 data, insider attacks cost companies about $144,000 per incident. Containing and resolving the complexities associated with...

Cleanup on Aisle IPO – Reacting to an impulsive insider threat

Published on August 14, 2015

An email mistakenly sent to the wrong employee provided the basis for a frantic incident response to a possible insider threat at the corporate headquarters of one of the largest fitness companies in the United States, just days before their IPO that raised over 200 million USD. A payroll manager...

Inside the Ashley Madison Breach

Published on July 31, 2015

Motivations and insider factors 37 million users may have their personal data at risk as a result of this latest data breach.   There are many factors to this breach that seem different than others that we have previously seen. With most data breaches customers are pursuing legal counsel, speaking to...

Behavior Analytics takes center stage in DC

Published on July 28, 2015

Securonix was recently invited as an ICIT fellow and industry leader to participate in an advisory meeting with senate staffers on the benefits of Behavior Analytics and to help describe the extensive ways in which it can be leveraged for insider and cyber threat detection and risk reduction. As we...

A Case of Corporate Espionage

Published on July 10, 2015

In May of 2015, two employees were accused of stealing trade secrets from two U.S tech companies named Avago and Skyworks. The attackers collaborated for years on how to obtain the data needed to stand up their own company in China to compete in the billion dollars a year business....

Security Analytics – Looking Beyond the Buzzwords

Published on April 13, 2015

As new security breaches continue to be identified at big-name companies, “cyber” buzzwords keep coming up in everyday discussions. Terms such as “APT”, “Spear Phishing", “Cyber Kill Chain” and “Advanced Malware” have become major talking points. Security companies are coming up with solutions that provide advanced threat intelligence, machine learning...

Cyber Security Gets Physical

Published on April 13, 2015

Security analytics applied to SCADA devices can detect changes in pressure, temperature or flow that indicate a valve is 3X hotter than any other valve with 3X the pressure, and is about to blow. Applied to medical devices like Pyxis pharmacy dispensing applications, analytics can detect a clinician withdrawing a...

Golden Triangle of Cyber Defense

Published on April 13, 2015

  New CompTIA study Trends in Information Security highlights growing complexity of security environment that challenges even the best prepared businesses. Organizations have to match the pace of technology changes (cloud computing, mobile technologies) to stay competitive, expand the scope of their security programs to reduce attack surface ballooning due to these...

Re: Who Validates Alerts Validated by Your Alert Validator Software?

Published on March 9, 2015

Another long comment inspired by Anton Chuvakin's post Who Validates Alerts Validated by Your Alert Validator Software? Using SIEM to detect multi-dimensional threats is a cyber peep show, and no matter how many peepers you throw at it, you never get a breadth and depth of the actual performance. Yes, there...

Re: The Rise of Non-Deterministic Security

Published on March 4, 2015

Anton Chuvakin wrote a great blog about the future of machine-learning in cyber-security. Alex Vaystikh wrote a great commentary on Anton's post. I followed Alex's lead and posted my comment to his comment in this blog... I'd argue though that "confidence" is not a politically-correct from of "correctness", pardon the...

Carbanak: the common threat with disastrous effects

Published on February 24, 2015

CARBANAC: the common man who changes into a god. "There are people in the street. I think they are hunting for Carbanac." A form raced up beside his own, the mighty body of Carbanac—Carbanac transformed into a monster, and out of whose lungs came bellowings that were like the roarings...