Resources

Analyst Reports, One Pagers and FAQs

There are still three main threats to be monitored by a detection solution: (1) malicious insiders and especially malicious administrators; (2) malicious API usage by third party applications; and (3) imposters.

Featured Videos

CISO Talks Podcast

One of us had been socially engineered… We tried to investigate with the insurance company, but they said there’s nothing they can do if somebody, by mistake gives his credentials to an imposter.

Detecting Unknown Threats in Business Applications

TAG Cyber’s Ed Amoroso speaks with Doron Hendler, CEO of RevealSecurity, about monitoring malicious insiders in SaaS and custom-built applications.

ADR Explained

EDR to NDR to ADR… Sounil Yu went over our ecosystem with the RevealSecurity dev team. Activity-based flows are at the root of it all.