Analyzing User Behavior is the Beginning. How It's Applied is What Really Matters.

Posted by Eran Cohen on Mar 3, 2017 2:59:40 PM

Think about this statement: “Half of the people you know are below average.” In simple terms, it means that statistically most of the people you know are considered to have average intelligence, or just below or above the line. Does this mean they are dangerous? Does it mean you should reconsider your friendship? Let’s not jump to conclusions just yet.

Read More

Topics: CISO, Behavioral Firewall, User and Entity Behavior Analytics, Use Case, ueba

A SWIFT Case to Stop Bank Heists with UEBA Behavioral Firewalls

Posted by Eran Cohen on Nov 17, 2016 3:13:54 PM

Enterprises almost always have users, accounts or processes that run critical business operations to enable smooth operations and ensure productivity. Often, there is a lot of emphasis placed on security, availability and integrity. Regardless of the checks and balances, systems are not infallible. Sometimes this is done because it is perceived to be secured trusted operations, and sometimes it’s based on a planned calculated risk management.

Read More

Topics: Use Case, ueba, SWIFT

Password Brute Force Attacks: Denying the Attacker, Not the Legitimate User

Posted by Vikas Arya on Aug 31, 2016 9:30:49 AM

When Mark Zuckerberg’s passwords were hacked from his twitter and other accounts, that news got everyone’s attention . Online articles  suggest that hackers got his password from the 2012 LinkedIn breach where 117 million accounts compromised. Mr Zuckerberg reused his passwords on other services, like Twitter, which got compromised.

This incident along with many other similar hacks proves that cyber-attacks are not isolated events,  they are like a giant wave with long-term effects that can set off a chain of events. 

Read More

Topics: Use Case, password brute force, Credential Compromise, ueba