Security Market Segment LS
Wednesday, 17 February 2016 11:45

The threat from within

By

Regardless of how good your end-point security may be all security companies agree that the human element is the weakest link. Most cyberattacks rely on compromised credentials.

Just last week it was revealed that the price for Apple employees to betray it was a modest US$23,000. As one staffer said, “You get emails offering you thousands to get a password to get access to Apple. I could sell my Apple ID login information online for €20,000 (£15,000 / US$23,000) tomorrow. That’s how much people are trying.” 

Apple is well known for working in silos limiting the damage such a breach could cause but the campaign appears to have targeted employees that could have accessed individual Apple user accounts, intellectual property, and corporate strategy.

Via Advanced Persistent Threat attacks (APTs) cybercriminals are breaking into corporate networks using stolen credentials and targeting high-value, sensitive data. According to ISACA, 74 percent of enterprises surveyed think they will be a target for APTs, and 28 percent have already been attacked.

Enter Exabeam, a User Behaviour Analytics (UBA) provider that helps companies find hidden intruders using big data science regardless of whether they change locations, devices, or logins. Cybersecurity breaches have gone well past stolen credit card numbers, with hackers targeting employee credentials to give them the keys to the enterprise castle. Exabeam can find and track these impostors throughout the system and use those clues to find others.

Last September it finalised a US$25 million financing round to support its rapid growth and to update its UBA solution and brings total investments in the company to $35 million.

It has just released Threat Hunter to help security professionals proactively identify and respond to adversaries within their networks. It enables analysts to search, pivot, and drill down across multiple dimensions of user activity to find sessions that contain specific risky behaviours.  

“The promise of UBA is that the system will notify security analysts about risky activities, and Exabeam excelled at that in ESG Lab testing,” said Tony Palmer, senior lab analyst, Enterprise Strategy Group. “Exabeam's Threat Hunter provides the other half of the equation—the ability to ask the system which users match a specific set of risk criteria and get useful answers.”

Threat Hunter provides:

  • Increased security – find advanced persistent threats before they cause data loss.
  • Reduced chance of data breach – find attackers that are hiding in the network by staying under the radar.
  • Faster response to cyber-attacks – effectively remove all adversaries once an attack is detected by finding all traces of activity.

“To date, UBA products have only offered something like a recommendation engine for security alerts. It’s like using Netflix but you can only see the suggestions for you, never search for what you want,” said Nir Polak, CEO of Exabeam. “With Threat Hunter, Exabeam gives you the power of advanced search to find the imposters in your infrastructure. It’s is the only UBA solution that solves security searching as well as alerting.”

Exabeam’s UBA solution leverages existing log data to quickly detect advanced attacks, prioritize incidents and guide effective response. The company’s Stateful User Tracking automates the work of security analysts by resolving individual security events and behavioural anomalies into a complete attack chain. This dramatically reduces response times and uncovers attack impacts that would otherwise go unseen.

Read 5157 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

SONICWALL 2022 CYBER THREAT REPORT

The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Ransomware
Cryptojacking
Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.

GET REPORT!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments