Late last week, the Centers for Medicare and Medicaid Services (CMS) disclosed that compromised insider credentials with access to HealthCare.gov's back-end insurance system exposed 75,000 individuals’ data.
What is 75,000 records in the face …
Late last week, the Centers for Medicare and Medicaid Services (CMS) disclosed that compromised insider credentials with access to HealthCare.gov's back-end insurance system exposed 75,000 individuals’ data.
What is 75,000 records in the face …
In my previous blog post, I talked about different approaches you can take to identify insider threats in your Windows environment with user behavior analytics — a rule-based vs. pattern-based approach. Specifically, why pattern-based detection has advantages…
Step 1: Implement user threat detection. Step 2: Have a glass of wine.
In my previous blog posts, I talked about pattern-based vs. rules-based user behavior analytics (UEBA), modeling user activity to build behavioral baselines, and the advantages of…
In my previous blog post, I talked about user behaviors that you want to model in order to capture a wide array of anomalies as well as how to use them to detect patterns of suspicious user activity.
But what is User Entity Behavior Analytics (UEBA)…