Topic: behavioral analytics
-
Gurucul AI-IRM: Detect Insider Threats Faster
Gurucul has launched the AI Insider Risk Management (AI-IRM) platform to enhance detection and response to insider threats through autonomous triage and bias-free risk scoring, addressing a sharp rise in such incidents. The platform integrates User and Entity Behavior Analytics (UEBA), identity a...
Read More » -
Reveal Platform Uncovers Post-Login Identity Insights
The Reveal Platform provides advanced post-authentication monitoring of identity behaviors across SaaS, cloud, and custom applications, addressing gaps in traditional security tools. It detects threats like credential abuse, insider risks, and automated attacks by analyzing cross-application beha...
Read More » -
Speed Up Real-Time Payments Without Compromising Security
Securing real-time payments requires balancing robust fraud prevention with a seamless customer experience, using advanced analytics and adaptive authentication to detect threats without slowing transactions. The speed of real-time payments increases fraud risk, making pre-authorization preventio...
Read More » -
Insider Threats: Australia's Top Cybersecurity Risk
Australian organisations are shifting their cybersecurity focus to insider threats, with 84% expecting an increase and 58% ranking them as a greater risk than external attackers. Many businesses are unprepared for insider threats, as only 34% use advanced detection tools like user behaviour analy...
Read More » -
AI Agents Surge 10:1 – Time to Rethink Enterprise IAM
The rapid rise of AI agents is overwhelming traditional identity and access management (IAM) strategies, with stolen credentials remaining a top cause of data breaches and AI workflows making identity the new cybersecurity frontline. Proximity-based authentication (e.g., Bluetooth Low Energy and ...
Read More » -
Google Enhances Ads Consent with New Data Controls
Google has introduced "Data Transmission Control", a new feature that allows advertisers to precisely manage what website data is transmitted to Google under specific user consent scenarios, building upon its existing Advanced Consent Mode framework. The tool provides granular, independent cont...
Read More » -
NSA Zero Trust: Where Guidance Meets Enterprise Reality
The NSA has released a phased implementation guide for Zero Trust security, translating principles into actionable tasks to help organizations build defenses based on their maturity level. The guidance emphasizes continuous evaluation and coordinated policy enforcement beyond initial login, treat...
Read More » -
Insider Threats: Protecting Your Team from Cyber Attacks
Cybercriminals are now infiltrating companies by impersonating IT professionals during hiring, using fabricated personas and deepfakes to gain trusted, privileged access to sensitive systems. The primary goals of these "fake workers" include severe data theft, financial fraud, and cyber espionage...
Read More » -
OpenText AI Boosts Enterprise Security for Identity, Data & Apps
OpenText has launched a suite of cybersecurity enhancements that integrate AI into security workflows, unifying protection across identity, data, applications, and forensics with tools like Core Threat Detection and Core Identity Foundation. The CE 25.4 release strengthens compliance with built-i...
Read More » -
PwC: AI Leads Cybersecurity Spending as Top Priority
Artificial intelligence is now the top cybersecurity spending priority for businesses, reflecting a strategic shift toward AI-driven defense mechanisms against evolving digital threats. AI-based security solutions lead budget priorities at 36%, surpassing other areas like cloud security and netwo...
Read More » -
Securing Australia: How AI and Identity Redefine Cybersecurity
Australian businesses face rapidly evolving cybersecurity threats where traditional defenses are inadequate, with attackers now prioritizing immediate execution over stealth using AI to target identity systems. Cloud environments have become particularly vulnerable, with compromised credentials b...
Read More » -
ShadowV2 Botnet: The Alarming Rise of DDoS-for-Hire
A new botnet called ShadowV2 uses cloud tools like GitHub CodeSpaces and Docker to deploy malware that launches powerful DDoS attacks, targeting vulnerable cloud infrastructure. The operation functions as a sophisticated cybercrime-as-a-service platform, featuring a professional API, user managem...
Read More » -
Fighting Next-Gen Financial Fraud: Key Strategies
Synthetic identity scams cost U.S. banks $6 billion annually, with criminals using data breaches and AI-powered tools to create and exploit fake identities. AI accelerates fraud by enabling large-scale scams, such as advance-fee schemes, where criminals target victims more efficiently and at mini...
Read More » -
Protect Your Business from Deepfakes: 4 Essential Steps Now
Deepfakes, created using AI, are a growing threat to businesses, enabling cybercriminals to produce convincing fake audio and video for fraud and misinformation. The risks include severe reputational and financial damage, such as stock value drops from fake announcements, and identity theft throu...
Read More »