Why we need more shades of gray

Why we need more shades of gray

A model-driven security analytics system that is thoughtfully designed and built would generate virtually no black-and-white answers. And that's a good thing, because the security challenges we face now and in the future will rely on...

05/24/17

Knowing when a trusted insider becomes a threat

Knowing when a trusted insider becomes a threat

The time has come to pay serious attention to new ways of identifying and preventing such insider threats early on.

04/04/17

3 security analytics approaches that don’t work (but could) — Part 2

3 security analytics approaches that don’t work (but could) — Part 2

Security analytics approaches using the strengths of Bayesian networks, machine learning and rules-based systems can be vital if they are thoughtfully built, combined and applied.

02/24/17

3 security analytics approaches that don’t work (but could) — Part 1

3 security analytics approaches that don’t work (but could) — Part 1

Bayesian networks, machine learning and rules-based systems individually don't work well. They don’t produce good results, don’t scale or are too hard to work with.

01/13/17

Building an insider threat program that works — Part 2

Building an insider threat program that works — Part 2

A world-class insider threat program must have three core characteristics: prevent insider threat events, adapt to threats and be able to scale.

10/05/16

Building an insider threat program that works – Part 1

Building an insider threat program that works – Part 1

Lessons learned from the front lines of insider threat risk management.

09/07/16

Why cyber hygiene isn't enough

Why cyber hygiene isn't enough

Organizations need to practice regular cyber hygiene for healthy outcomes. But they must also take steps to mitigate cyber risk—the most serious threats to our security.

06/22/16

Load More