User Behaviour Analysis stories
Amidst the shift to cloud, Forcepoint's Nick Savvides highlights adaptive risk modelling as key to modern data and user protection strategies.
ManageEngine introduces user and entity behaviour analytics (UEBA) into its SIEM solution, Log360, to improve threat detection.
ManageEngine boosts IT security with UEBA tech in ADAudit Plus to thwart insider threats & slash false alarms.
eCommerce sites, in particular, are increasingly targeted by hackers due to the sensitive payment card information.
ResponSight, an Australian data science firm, marks rapid growth with its behavioural analytics software, securing a USD $2 million seed round for expansion.
Cybersecurity giant RSA is now offering behavioural analytics as part of its portfolio after successfully acquiring Fortscale.
Addressing the requirements of an OT network is now more important than ever and requires an integrated approach.
The more log data businesses amass, the greater opportunity they'll have to detect, diagnose and protect themselves from cyber-attacks.
LogRhythm introduces User and Behaviour Analytics to protect against insider threats and account takeovers in organisations.
Dtex's Mohan Koo on the importance of looking beyond firewalls, and the opportunities and challenges in Australia.
Cybereason partners with Exabeam to merge endpoint detection with SIEM, enhancing threat detection and reducing incident response for cybersecurity analysts.
Aruba has extended its reach into the security market by fusing together network security with User and Entity Behavioural Analytics.
Cybersecurity firm Forcepoint has spent an undisclosed amount on the acquisition of security analytics provider RedOwl.
Security intelligence provider Gurucul is setting its sights on the Asia Pacific region.Symantec/Blue Coat head of sales Sandeep Puri leads the way.
ResponSight CEO Jeff Paine reveals the firm's innovative approach to breach detection, moving away from the industry's 'silver bullet' solutions.
Isolation is a thing of the past - at least when it comes to electronic and cyber security. They are rapidly converging. How will they work together?.