Behavioral Intelligence

Using UEBA to Gain Behavioral Intelligence

We recently worked with a large online retailer to increase...


UEBA and EDR Image

Detecting a Red Team Attack with UEBA and EDR

Cybersecurity threat hunters are an essential part of cyber...


Airline Security Breaches

Cyber Turbulence for Major Airlines

Over the past several weeks, we have heard of the breaches...


Computer Security

Endpoints Still Matter

I am privileged in my role with Interset that I get to spend...


Chip Security

When The Chips Are Stacked Against Us

Business today depends on technology. It doesn’t matter if...


Bank Vault Door

How SWIFT’ly the attacks come!

The breaches that make the news are the sensational ones....


Checkmate Robot

Gaining the Upper Hand on Cyber Threats

We hear about it every day: another breach, another hack,...


Do you see what We See

Stereograms and Intrusion Detection: Finding the Hidden Entity

You may be familiar with stereograms, hidden 3D pictures...


Threat Detection

Don’t Replace your SIEM-Embrace it with Security Analytics

  Every year when the Gartner Magic Quadrant comes...