Stop Insider Threats With Automated Behavioral Anomaly Detection

Introduction Finding a malicious employee is one of the toughest cyber-security challenges in the industry. Someone who has been deliberately given access to sensitive information... but violates that trust and secretly steals private data to give to a third party....

Identifying Data Exfiltration in AWS CloudTrail Logs Using Categorical Anomaly Detection

In our previous blog, Identifying stolen credential use in AWS CloudTrail logs with high confidence using categorical anomaly detection, we discussed the “False-positive reducing” power of analyzing the categorical data in AWS CloudTrail logs to identify novel behaviors. We...

Identifying Stolen Credential Use in AWS CloudTrail Logs with High Confidence using Categorical Anomaly Detection

The move to the cloud represents new challenges for enterprise security teams. Systems are more distributed and the impact of credential theft is greater than ever. Running your services in a public cloud vendor like AWS requires you to...

Network Log Analysis Using Categorical Anomaly Detection

The distributed nature of modern virtualized software architectures has created added complexity in the networking stack, making it difficult to attribute behavior to any single service. Instrumenting services will give you insight into activity within the service, but doesn’t...

thatDot Anomaly Detector Enhancements: Visualizations and Data Transformations

Since the launch of thatDot’s Real-time Anomaly Detector for Categorical data in November, we have received numerous feature requests for additional data exploration and data transformation capabilities. We are excited to announce the addition of these key functions in...