Stop Insider Threats With Automated Behavioral Anomaly Detection

Introduction Finding a malicious employee is one of the toughest cyber-security challenges in the industry. Someone who has been deliberately given access to sensitive information... but violates that trust and secretly steals private data to give to a third party....

Identifying Data Exfiltration in AWS CloudTrail Logs Using Categorical Anomaly Detection

In our previous blog, Identifying stolen credential use in AWS CloudTrail logs with high confidence using categorical anomaly detection, we discussed the “False-positive reducing” power of analyzing the categorical data in AWS CloudTrail logs to identify novel behaviors. We...

Identifying Stolen Credential Use in AWS CloudTrail Logs with High Confidence using Categorical Anomaly Detection

The move to the cloud represents new challenges for enterprise security teams. Systems are more distributed and the impact of credential theft is greater than ever. Running your services in a public cloud vendor like AWS requires you to...