1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

User behavior analytics is key to identifying nefarious use of insider credentials

Discussion in 'Network World' started by RSS, Jan 27, 2016.

  1. RSS

    RSS New Member Member

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

    Almost all data breaches involve use of legitimate logon credentials. Guarding against these “insider threats” requires the ability to detect when cybercriminals are using stolen credentials. Sadly, traditional network security tools are not effective in identifing or mitigating these threats. However, a new breed of user behavior analytics solutions has been designed for this specific purpose and is proving effective.

    The expression “insider threat” usually conjures up images of rogue employees or criminally minded contractors or business partners that are authorized to access company data. But the term is also used in a much broader sense to mean any threat or attack that abuses the logon credentials or privileges of legitimate employees or other insiders.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page