Five Use Cases of Behavioral Analytics to Protect Customer Networks

2017-05-21T06:20:47+10:00

Interest in user and entity behavioral analytics, or UEBA as recently coined by Gartner, has risen dramatically over the past 12 months. And it’s for valid reasons. Attackers are using more and more sophisticated approaches to bypass traditional defense mechanisms. Companies are constantly looking for enhanced solutions to protect their users and valuable assets, [...]

Five Use Cases of Behavioral Analytics to Protect Customer Networks2017-05-21T06:20:47+10:00

Recommended Action for Linux Kernel Vulnerability

2017-05-21T06:19:51+10:00

Recently, a critical zero day vulnerability in a Linux kernel module was publicized. If successfully exploited on a Linux device, this vulnerability would allow an attacker to potentially execute arbitrary code with escalated privileges. Devices running Linux kernel 3.8 or higher are potentially vulnerable to this bug, meaning millions of Linux devices and around [...]

Recommended Action for Linux Kernel Vulnerability2017-05-21T06:19:51+10:00

Tips for Email Security

2017-05-21T06:08:03+10:00

May 5th, 2016 is World Password Day – a day created to encourage safe password practices. The best defense against external threats is staying informed and diligent with your security practices. Here are some tips to help stay safe from email threats: Never share your password. If someone is requesting this information via email, [...]

Tips for Email Security2017-05-21T06:08:03+10:00

SIEM for the Rest of Us

2017-05-21T05:32:36+10:00

SIEM systems were first created for large enterprises and government agencies that were frequent targets of advanced cyber attacks. Back then, smaller and lower-profile organizations were able to get by with basic security tools as they were seldom the target of hackers. The world has changed and today cyber attacks have become so widespread [...]

SIEM for the Rest of Us2017-05-21T05:32:36+10:00
Go to Top