• The ‘Insider Threat’ is Privileged Access, not a Person

    By John Worrall The standard reply to “what is an insider threat,” generally circles around the concept of a bad apple within the company and this is shortsighted. Principal investigators in Oxford University’s Corporate Insider Threat Detection research program have …

  • Analyze This: How IP Addresses Can Save the Day

    By CyberArk Labs Everyone in the security business is talking about analytics – threat intelligence, big data, mining, etc. Clearly, sifting through huge amounts of data has significant value for understanding the complex nature of IT infrastructure and advanced cyber …

  • Effective Behavior-based Defense

    By CyberArk Labs Analytics are a tricky business, no matter what purpose they’re applied to, let alone for use to stop a cyber-attack in progress. Take behavioral analytics, for example. What’s simply odd and what’s a threat? And if you’re …

  • Powering Up Threat Detection with Privileged Threat Analytics

    By John Worrall One of the most common and disturbing aspects of the data breaches and cyber-attacks we see on a weekly basis is that attackers typically are on the target company’s network for weeks, months and even years at …