User Behavior Analysis 101: What You Need to Know

Written by - March 21, 2017

Words like “hacker” and “breach” strike terror into the hearts of employers, but with user behavior analytics (“UBA”), organizations can more easily track the types of activities that may indicate intrusions. Understanding behavior analytics requires understanding security analytics. More recently, UBA has also been called user and entity behavior analytics (“UEBA”) to better encompass how the algorithms work. The two terms are often used interchangeably. These kinds of programs analyze log and event data from applications, endpoint controls, and network defenses. With user behavior analytics, vendors can use big data techniques to determine employee patterns of behavior so that anomalies can be more easily detected. This can help locate or trace breaches. Difference Between SIEM and UBA Security identity event…

Categorized in:

Security Awareness: 5 Ways to Educate Employees

Written by - March 13, 2017

Security awareness training is the number one tool needed to build a culture of cyber security. For a business to remain secure, employees from the top levels of senior management to the most introductory level jobs need to buy into the importance of cyber security. Employee training sessions, however, are like those required introductory college courses. People feel they already know the information so they only half-heartedly pay attention and then wing the quizzes at the end hoping for the best, sort of like those college essays they hated writing. Unlike a college essay, security awareness has long-term financial and reputational risk implications. The 2016 IBM Cost of Data Breach Study indicated that individual breaches cost an average of $4…