Category: User and Entity Behavior Analytics

How Security Operations Can Safely Stop Investigating Benign True Positives

True Positives. It’s a topic of great interest to me. Security Operations can spend a lot of time dealing with...
Read Now

Real-time vs After the Fact: Pitfalls of Log-based Behavioral Threat Detection

It was recently published that Shadow Brokers, the group behind the Equation Group leak, are selling a new set of...
Read Now

Analyzing User Behavior is the Beginning. How It’s Applied is What Really Matters.

Think about this statement: “Half of the people you know are below average.” In simple terms, it means that statistically...
Read Now

Traditional UEBA vs Behavioral Firewall for Breach and Insider Threat Prevention [Part 2 – Blog Series]

In our Part 1 Series, we talked about User and Entity Behavior Analytics (UEBA) and its benefits for better detecting...
Read Now

Enterprise Security in Times of War

Enterprises define security policies that match their business objectives. By setting security policy rules, an organization can better enable the...
Read Now