Security Analytics

21 Jun 201 Days to Identify Data Breach

New study finds that on average it takes 201 days to detect a data breach and 70 additional days to contain it. But advanced technologies can significantly reduce these times. During recent years, numerous reports have shown that in general, it takes an enterprise a number of months to detect that they’ve had a data breach. That’s if they detect it...

Read More
User Behavior Analytics real keys

14 Jun The Real Key To User Behavior Analytics

User Behavior Analytics (UBA) uses and benefits from a number of different technologies. But knowing which technologies and data need to be analyzed for any given situation and context, and applying the correct weight for the many variables is the real key. User Behavior Analytics Of necessity UBA utilizes a large number of highly sophisticated technologies, including managing and interoperating with numerous...

Read More
compromised passwords

19 May Compromised Passwords in 6 of Top 10 Vulnerabilities

There are a lot of opinions about the biggest vulnerabilities when it comes to computer security. But compromised passwords remain a common theme among most lists of top vulnerabilities. Although top vulnerabilities may be manifest in varying ways, stealing user credentials belonging to legitimate users—especially privileged users is at the heart of most of the biggest vulnerabilities. Passwords Top The List A case...

Read More
Gambling with Sloppy Security Practices

05 May Gambling with Sloppy Security Practices

  This week I’ve been studying a number of recent, very large data breaches. The victims all had one thing in common—sloppy security practices. Unfortunately these organizations are not alone in their casual attitudes about security. Everywhere we look I see evidence that far too many companies are playing a very high stakes game of gambling with sloppy security practices. Here are...

Read More
2016 year of ransomware

02 May 2016—The Year of Ransomware

Earlier last month, several police departments in Lincoln County Maine was attacked with Ransomware. That’s pretty bold since law enforcement generally does not pay ransom. They are the guys that are supposed to stop folks from having to pay extortion money. Ransomware has been around since 2005, but we’ve seen a significant escalation in recent years, starting in 2012 and continuing through...

Read More

31 Dec IN MOST TARGETED ATTACKS AND ADVANCED THREATS, THE EVIDENCE IS ALREADY IN THE LOGS

According to reports, while 86% of cyber attack victims had evidence of security breaches in their log files prior to data compromise, the majority of these breaches took weeks or months to discover. In other words, the data exists in scattered security sensors, in a centralized SIEM or even in new Big Data platforms. But the majority of enterprises still...

Read More

31 Dec STEP 1: STORE THE DATA

Many enterprises have already begun to implement Big Data platforms to protect themselves from targeted cyber campaigns and manage sophisticated investigation efforts. These platforms are designed to pull in as much relevant data as possible - data from networks, endpoints, databases, applications and identity and access management systems - but that's the easy part. Some organizations already store this valuable...

Read More

31 Dec FINDING THE NEEDLE IN THE BIG DATA HAYSTACK

The hard part is sifting through that data to identify those select few events that indicate a potential breach or threat. In fact enterprises have SOC teams and IT security engineers, and sometimes cyber analysts, security data scientists and forensics experts, that manually dig for intelligence, typically using self-built and limited tools, to identify possible security breaches or threats. ...

Read More

31 Dec 3 BASICS GUIDELINES FOR EFFECTIVE SECURITY ANALYTICS

Translate the mountains of data collected by disparate systems into intelligence that can be used to discover potential threats. Crunch the data and automatically prioritize thousands of events and logs using advanced analytics that can pinpoint under the radar attacks with no predefined rules, heuristics or thresholds. Monitor security events on an ongoing basis, together with complex and automatic analyses designed to...

Read More

31 Dec NEW TOOLS

Automated big data analytics tools enable organizations to transform their endless data sources into actionable intelligence that improves their ability to defend themselves from targeted attacks and cyber criminals in real-time. In addition, these tools allow more effective investigation analysis in order to discover the entire attack path. This can reveal, for instance, how the adversary infiltrated the network, how...

Read More