Webinars

Beyond the Hype: Use Cases that Work with Applied Behavioral Analytics

Phishing and other human-facing social engineering tactics remain the primary vectors of successful attacks. The transition to remote work greatly expanded the attack surface and opened new vectors for campaigns. Organized cybercrime groups commonly use zero-day attacks to avoid detection....
Read More

Applying the MITRE ATT&CK Framework to Detect Insider Threats

The MITRE ATT&CK framework has become an excellent way for security professionals to understand and describe threats. However, most of the time, it is used to describe the actions of external threats. But what about the insider threats? According to...
Read More

The Big Catch Up of 2021: Securing a Digital Evolution

The pandemic has broadened the threat landscape, but businesses and security teams have to do more with less. How are businesses keeping ahead of the changing threat landscape, retaining key personnel, and facing an uncertain economy? This year has delivered...
Read More

The Challenge of Detecting Threats in the Cloud

By 2023, more than 50% of all workloads will leverage public cloud, hybrid, or edge, up from approximately 20% in 2020 (Gartner). Detecting threats in the cloud presents several challenges: dealing with new technologies, facing new threat scenarios, exacerbated by...
Read More

AWS Security Monitoring – Top 10 Use Cases

Enterprises are increasingly adopting a cloud-first approach to increase IT agility, nearly unlimited scalability, and lower costs. Amazon Web Services, with the richest suite of public cloud IaaS and PaaS-layer capabilities, continues to lead with more than 30% of the...
Read More

Better Together: Fighting Modern Threats with XDR and SIEM

A new wave of security solutions called XDR – Extended Detection and Response - have taken the security market by storm. Is this what your organization need to detect and respond to today's and tomorrow's threats? According to Gartner, XDR...
Read More

Securing Identity - 1 Year Check-In

According to Verizon’s 2020 Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involved the use of lost or stolen credentials - and approximately 35% of all breaches were initiated due to weak or compromised credentials. Last year, we...
Read More

The Human Element in Applying AI to Detecting Cyber and Insider Threat

There’s a lot of hype around applying machine learning, cognitive learning, and artificial intelligence to detect security threats in an environment. While analytics capabilities have advanced, there are still practical limitations in applying AI, such as: Lack of data that...
Read More

TEN ISE Fireside Webinar: Community-Based Approach to Threat Hunting

When it comes to detecting continuously evolving threats, SOC teams that rely solely on their own threat hunting content are often at a disadvantage. In fact, many advanced threats can bypass preventative and detection controls, making SOC members work twice...
Read More

SWIFT Security: Monitoring Cyber Threats with Behavior Analytics

Effectively detecting and identifying fraudulent activities in a complex SWIFT environment requires a big data analytics platform that relies on machine learning algorithms and artificial intelligence – not on static rules. Thomas Harrington, Securonix Board of Advisor, CISO Citi (Retired),...
Read More

Search, Hunt, and Collaborate with Cloud Native SIEM in AWS

Securonix's new search capabilities leverage the power of Amazon Web Services (AWS) cloud-native and big data architecture to enable dynamic and long-term searches at a fraction of the cost without any performance impact. Join Nitin Agale, Senior Vice President, Product...
Read More

Detecting the Unknown Threats: An Identity-Driven Approach

With our perimeters expanding beyond the confines of the typical workspace, it has become increasingly evident and critical to monitor the threats posed using insider credentials. Regardless of whether the threats are accidental or intentional, they both ultimately lead to...
Read More