Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Posted by Monnia Deng on Dec 24, 2018 9:21:00 AM

Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la! 

'Tis the season to be swindled, Fa, la, la, la, la, la, la, la, la!

Read More

Topics: User Behavior, Threat Mitigation

You Failed Your Pen Test: How Can You Reduce Your Attack Surface?

Posted by Heather Howland on Nov 9, 2018 4:04:03 PM

Penetration testing is a critical best practice for virtually any organization’s cybersecurity posture. By putting defenses to the test against trained offensively-minded professionals, organizations can gain deep insights into how they’ll fare against real attackers. Often, the challenge is that the results are not what you would have hoped. When pen testers are able to carve through your defenses at will, it can be discouraging and hard to know where to start.

Read More

Topics: Insider Threat, Hacking, Threat Mitigation

Traditional UEBA vs Behavioral Firewall for Breach and Insider Threat Prevention [Part 2 - Blog Series]

Posted by Heather Howland on Sep 29, 2016 11:55:37 AM

In our Part 1 Series we talked about User and Entity Behavior Analytics (UEBA) and its benefits for better detecting possible breaches and insider threats through user and entity behavior and risk scoring.  Now let’s talk about the differences between traditional UEBA vs the newer UEBA solution, the Behavioral Firewall, which integrates adaptive responses to prevent threats.

Read More

Topics: ueba, Behavioral Firewall, User and Entity Behavior Analytics, Threat Mitigation, Identity Verification

Solving Important IT Security Problems with the Preempt Behavioral Firewall

Posted by Ajit Sancheti on Jun 13, 2016 8:27:00 AM

“Being the founder of a startup is a very unnatural thing to do.”

Those were the words of a board member from my previous company. Most people would rather work in a more established company solving problems they deem challenging, without having to worry about customers, finances, employees, etc.

Read More

Topics: Threat Mitigation, User Behavior, CISO, Behavioral Firewall, Adaptive Response

Threat is Relative. 5 Easy Actions to Mitigate Threats at Work and Play.

Posted by Eran Cohen on Jun 10, 2016 10:30:00 AM

Just recently,  I was talking to a tourist who told me how safe my city was. I nodded and agreed. It took me few more minutes to understand which parts of the city he considered "safe".

Read More

Topics: Threat Mitigation