Please turn on your JavaScript for this page to function normally.
ransomware attack
The 3 key stages of ransomware attacks and useful indicators of compromise

For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary …

AI
Gurucul launches Sme AI to improve threat detection and response capabilities

Gurucul has launched its new generative AI capability called Sme (Subject Matter Expert) to accelerate threat detection, supercharge security investigations and automate …

insider threat
Insider attacks becoming more frequent, more difficult to detect

Insider threats are a top concern at organizations of all kinds; only 3% of respondents surveyed are not concerned with insider risk, according to Gurucul. With responses from …

insider threat
What do SOC analysts need to be successful?

Gurucul announced the results of a Black Hat USA 2022 security professionals survey with respondents indicating that insider threats were the most difficult type of attack for …

cloud
Gurucul’s poly-cloud and multi-cloud offering accelerates security teams’ ability to mitigate threats

In Las Vegas, at Black Hat USA 2022, Gurucul announced advanced Poly-Cloud architecture support, enhanced multi-cloud deployments, and cross-cloud detection and response …

insider threat
Only 25% of organizations consider their biggest threat to be from inside the business

A worrying 73.48% of organizations feel they have wasted the majority of their cybersecurity budget on failing to remediate threats, despite having an over-abundance of …

security platform
Gurucul releases cloud-native SOC platform to improve security analyst effectiveness

Gurucul released Gurucul Security Analytics and Operations Platform. A cloud-native, unified and modular platform for consolidating core security operations center (SOC) …

organize
7 threat detection challenges CISOs face and what they can do about it

Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 …

Magnify
The evolution of security analytics

As networks continue to evolve and security threats get more complex, security analytics plays an increasingly critical role in securing the enterprise. By combining software, …

XDR
XDR: Unifying incident detection, response and remediation

According to IBM’s Cost of a Data Breach Report 2020, the average time it took a company in 2019 to identify and contain a breach was 279 days. It was 266 days in 2018 …

risk
How to enforce real-time controls based on behavior risk scoring

For decades, the traditional approach to securing digital assets has been based on using a primary set of credentials, namely a username and password. This binary model …

person
Exploring the risky behavior of IT security professionals

Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their …

Don't miss

Cybersecurity news