Story image

Why User Behaviour Analytics are the secret weapon in your security strategy

27 Mar 17

Imagine this: Someone who logs in to their bank account may check their balances and funds. Compare this to what a cyber hacker would do: log in, edit account records and wire money.

If there are multiple VPN sessions from a foreign country at 2am, but nobody is travelling and employees only log in from their local office at 8am – alarm bells should be ringing.

These are vastly different behaviour patterns – and LogRhythm has provided a way to set up alerts when this type of thing happens. It’s called User Behaviour Analytics (UBA). 

A new peer-written white paper, sponsored by LogRhythm, takes a look at how user behaviour analytics can really make the difference in your security protocols.

Titled CISOs Investigate: User Behavior Analytics – Peer-authored research, this firsthand look into UBA shows you:

  • What UBA is, how it works, and the key things you should consider
  • How to sell UBA to the C-Suite, reduce losses from breaches, staff implications and compliance
  • What UBA looks like in the market, including UBA vendors such as LogRhythm
  • What happens when UBA doesn’t work
  • Exclusive contributions from top CEOs, including IBM’s global CISO, David Cass
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Security platform provider Deep Instinct expands local presence
The company has made two A/NZ specific leadership hires and formed several partnerships with organisations in the region.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.