Collateral
Analyst Reports, One Pagers and FAQs
This white paper provides an overview of the cybersecurity detection landscape, zooms into a gap identified by RevealSecurity in the application layer, and outlines a solution to this gap.

This white paper provides an overview of the cybersecurity detection landscape, zooms into a gap identified by RevealSecurity in the application layer, and outlines a solution to this gap.

The combination of rogue insiders and external attackers makes application detection a massive pain point for enterprises, particularly within their core business applications.

There are still three main threats to be monitored by a detection solution: (1) malicious insiders and especially malicious administrators; (2) malicious API usage by third party applications; and (3) imposters.

Edward Amoroso explains how user journey analysis provides detection and security for applications

TAG Cyber interviews RevealSecurity CTO, David Movshovitz

Detecting anomalous behaviors of users in an application is as tough as finding a needle in the haystack.

The most important criteria in a detection solution is accuracy: the number of false positives and number of false negatives, and the goal is of course to minimize these alerts…

Featured Videos

CISO Talks Podcast
One of us had been socially engineered… We tried to investigate with the insurance company, but they said there’s nothing they can do if somebody, by mistake gives his credentials to an imposter.

The Needle in the Haystack
The invention of this new clustering algorithm, the ability to truly identify with a great signal-to-noise ratio that is truly lacking false positives, really promises to be revolutionary.

Body Language
The principal is that body language doesn’t lie, it’s unconscious behavior… And your online actions and behaviors are telling: they’re either part of an established pattern, or not.