Resources

Analyst Reports, One Pagers and FAQs

There are still three main threats to be monitored by a detection solution: (1) malicious insiders and especially malicious administrators; (2) malicious API usage by third party applications; and (3) imposters.

Featured Videos

CISO Talks Podcast

One of us had been socially engineered… We tried to investigate with the insurance company, but they said there’s nothing they can do if somebody, by mistake gives his credentials to an imposter.

The Needle in the Haystack

The invention of this new clustering algorithm, the ability to truly identify with a great signal-to-noise ratio that is truly lacking false positives, really promises to be revolutionary.

Body Language

The principal is that body language doesn’t lie, it’s unconscious behavior… And your online actions and behaviors are telling: they’re either part of an established pattern, or not.