The other day I was speaking to a good friend of mine. He’s an executive consultant working for a large Fortune 1000 organization. As we are talking I realize that he has access to a lot of highly sensitive information that if exposed could be rather damaging to the company. He was lamenting to me how he needed to get access to some data on one of the servers but IT blocked him from accessing it until he completed a mandatory online “IT Security Awareness” training.
Last month, Special Agent Scott Mahloch, weapons of mass destruction coordinator for the Chicago division of the FBI spoke at the Food Safety Consortium about how food companies can protect themselves against terrorism by identifying the insider threat and some of the FBI’s initiatives in this area. While the focus of his talk was around protecting the food supply from intentional contamination with chemical, biological, or radiological (CBR) agents, I found that much of the advice on guarding against these types of Insider Threats directly applies to cybersecurity and it would be interesting to share how these tips can be applied in IT security -- not only for food companies, but companies in general.
When thinking about some traditional User and Entity Behavior Analytics (UEBA) solutions today, I can’t help but think about a Rube Goldberg machine, an over engineered machine that performs a seemingly simple task.
One of my favorites is “The page Turner”. And I’ll admit it, I like playing with these useless contraptions -- and even build them. By the highview count on that video it seems I’m not alone in enjoying them. But this does make me wonder what this says about us. Why do we build overly complicated systems to effectively (in a way) complete tasks so inefficiently?
Enterprises almost always have users, accounts or processes that run critical business operations to enable smooth operations and ensure productivity. Often, there is a lot of emphasis placed on security, availability and integrity. Regardless of the checks and balances, systems are not infallible. Sometimes this is done because it is perceived to be secured trusted operations, and sometimes it’s based on a planned calculated risk management.
In this final blog of the series “A Closer Look Inside UEBA: Top 5 FAQs,” we’re going to discuss what it takes to manage UEBA and how it can make security teams much more efficient and less overwhelmed.
This is part 4 of an ongoing series of posts that answer “A Closer Look Inside UEBA: Top 5 FAQs.” In our last post in the series we talked about the benefits of UEBA solutions. This week let’s take a look at the question that is on the mind of every budget-minded and busy security professional:
There is a lot of noise in the cybersecurity space with every company trying to differentiate itself by claiming to be the “next big thing”, but so few have risen to the top. And the security market has changed a lot in the past couple years. As a venture capitalist, I often get asked about how I see the market changing and how we cut through the noise to find and fund companies that are doing something truly unique and innovative and that really solves customer problems.
This week at the Gartner Symposium and ITxpo, David Cearley, Gartner Vice President and Fellow discussed the Top 10 Technology Trends of 2017 and their impact on IT and operations over the next 5 years. With cyber attacks showing no sign of waning anytime soon, it’s no surprise that the macro trend of an Adaptive Security Architecture is highlighted again this year. The the report focused more on importance of User and Entity Behavior Analytics (UEBA) as a component of this architecture as well.
This is part 3 of an ongoing series of posts that answer “A Closer Look Inside UEBA: Top 5 FAQs.”
In the last couple posts in this series, we provided an understanding of User and Entity Behavior Analysis (UEBA) and outlined the difference of traditional UEBA solutions and Behavioral Firewalls. Now let’s dive into the top 4 benefits organizations are gaining from using UEBA in their security program.
In our Part 1 Series we talked about User and Entity Behavior Analytics (UEBA) and its benefits for better detecting possible breaches and insider threats through user and entity behavior and risk scoring. Now let’s talk about the differences between traditional UEBA vs the newer UEBA solution, the Behavioral Firewall, which integrates adaptive responses to prevent threats.