
Insider attacks still far more difficult to detect and prevent than external cyber attacks
A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …

Manufacturing sector most vulnerable to insider threats
Almost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious …

Gurucul extends behavior based security analytics to entire IT stack
Gurucul, a leader in behavior based security and fraud analytics technology, announced a new version of its Gurucul Risk Analytics (GRA) platform, which extends behavior based …
Gurucul introduces managed security analytics service
Gurucul announced Gurucul Labs, a managed security analytics service based on the Gurucul Risk Analytics (GRA) platform which provides the data science expertise many …
Jasen Meece to head business development for Gurucul
Gurucul announced that Jasen Meece, former Managing Partner for IBM’s Global Security Group, has joined the company as President. He will oversee sales, business development, …

New infosec products of the week: May 18, 2018
Monitor user and entity behaviors to prevent advanced attacks Gurucul Fraud Analytics uses purpose-built machine learning models to correlate cross-channel behaviors and …

New infosec products of the week: November 18, 2016
ThreatQuotient delivers threat intelligence platform for threat operations and management ThreatQ v2 has transformed the threat intelligence platform into a powerful …
Featured news
Resources
Don't miss
- Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543)
- WinRAR zero-day was exploited by two threat actors (CVE-2025-8088)
- APT groups are getting personal, and CISOs should be concerned
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations