Friday, September 29, 2017
User behavior related work
User behavior related work
Many enterprises already recognized the importance of protecting against various threats that anti viruses cant predict but also the high probability of inside-out threats that pass undetected. Event if a threat is detected, most organizations arent equipped to respond effectively. Because of that, different user behavior based security software has been built and usually named under a general term User and entity behavior analytics (UEBA) software. It can be defined as: "Analysis of the behaviors of organizations employees, outsiders connected to their networks (such as third party contractors) and flagging security vulnerabilities across organizations assets that hold sensitive data.".
The difference between UEBA and the rest of the similar security software is that it usually can quickly identify a threat or an exploitable asset and then take action to remediate security risks across the entire infrastructure. Here Ill list a few examples of some software for different purposes that offer such features.
SentinelOne
Software that can be deployed across Windows, OS X and Linux endpoints along with Linux Ubuntu management server. They offer:
- monitoring kernel and user space (files, processes, system calls, memory, registry, network etc.). More details can be found in their technical brief.
- rapidly eliminating threat by killing malicious processes, rolling back manipulated files, disconnecting compromised devices,
- real-time attack forensic analysis.
Platform that seems to be supporting Windows OS only. They offer:
- monitoring following data sources: VPN, FW, IPS/IDS, web proxy, email logs,� packets, DNS logs, Active Directory logs, �DHCP logs,
- detecting privilege escalation, credential violations, internal reconnaissance, lateral movement, abnormal access to high value resources, command and control, exfiltration,
- alerts classified by severity and attack stage.
Platform that supports Windows & NAS, Exchange, Active Directory, SharePoint, UNIX/Linux, Office 365. Mostly offers detecting security gaps and insider threats by tracking changes to important configuration files, access to sensitive files, malware, privilege escalations, access denied events and more. Also includes:
- monitoring files and emails,
- full visibility on permissions (folder, mailbox, sharepoint),
- real-time alerts and comprehensive auditing.
Platform contains their own implementation of syslog-ng log management solution but doesnt offer much information about the data sources. Their technical documentation can be found here, and the features they offer include:
- analyzing biometric information (typing style or typical mouse movements),
- automatic notifications based on top suspicious activities.
This solution helps in protecting online banking sites against account takeover, fraudulent transactions, and can detect end user devices infected with high risk malware. It includes:
- analyzing biometric information (subtle mouse movements and clicks),
- possible integration with mobile devices for analysis of malware infections, root and jailbroken information, accurate geolocation and Wi-Fi security status.
- protection of web browser sessions to prevent tampering of customer transactions,
- prevention of phishing attacks, malware infections and removal of existing malware,
- protection against phishing of login credentials and payment card data.
This threat analytics platform offers insight into endpoints, applications, devices and users. Its benefits are:
- identifying and predicting malicious insiders and comprised accounts
- detecting and blocking fraud by proactively alerting on anomalous behaviors,
- real-time contextual view of attacks and detailed reports
download file now
Wednesday, September 20, 2017
Getting Back to Real Life yeah we work and stuff
Getting Back to Real Life yeah we work and stuff
This is such a mom perspective. I remember one of our first weekend trips began with just a bit of tension when I returned home from work on a Friday afternoon and Jeremy proudly proclaimed that we were all set to go. My eyes whirled around in my head moving from the mugs in the sink to the crumbs under the dining room table to the full recycling bin. I was sputtering, huffing, and banging my way around the house cleaning up while Jeremy looked on in a state of total bewilderment. He honestly could not understand what the big deal was. If we werent there, who cared if the house was a little messy?
Well, I did and I still do. And God love him, he has come a long way on this one. He now knows that the camper isnt pulling out of the driveway if there is any food debris whatsoever in the kitchen sink strainer. He loves our weekend trips enough not to fight city hall on this one.
Another strategy for making these short trips manageable is that we never get home late on Sundays. We always drive back during afternoon nap and usually pull in around 3:30 or so. This gives us a good two hours before dinner to pull things together around the house. I am inside unpacking and doing laundry, Jeremy is outside hosing out the truck and mowing the lawn, and the boys are revisiting every toy that they missed over that long 48 hours. It sounds like we are doing our best to fulfill every suburban family stereotype out there...
So we have our routine down, and it usually goes pretty smoothly. The only thing I really struggle with every time is Sunday dinner. I never have a lot in the fridge since I try to use everything up before we go away. And I always want something very quick and simple since I am also trying to get all those chores done.
Last week I came up with the perfect solution: sweet potato risotto. I chopped up an onion and some garlic and two great, big sweet potatoes and sauteed them for about five minutes. Then I added two cups of risotto and sauteed it for another five minutes. I had a box of chicken stock in the pantry and I just kept adding it to the rice (about a half a cup at a time) until the risotto was soft and creamy (al dente is over-rated with toddlers in the house). A handful of Parmesan, a side of arugula salad, and dinner was served. You can get pretty precious with risotto, and it can be a time consuming dish if you are really particular about the results. Lucky for me, this wasnt an episode of Chopped, and my boys--all three of them--gobbled it up.
My extra special bonus: there was plenty left over for everyones lunch the next day. Clean up was a snap, the boys were in bed, and I was on the couch watching The Amazing Race by eight that evening. The perfect end to a perfect weekend.
download file now
Friday, September 15, 2017
European Companies Must Tell Employees If Their Work Emails Are Being Monitored
European Companies Must Tell Employees If Their Work Emails Are Being Monitored
Finally, European companies must inform employees in advance if their work email accounts are being monitored. Yes, the European Court of Human Rights (ECHR) on Tuesday gave a landmark judgement concerning privacy in the workplace by overturning an earlier ruling that gave employers the right to spy on workplace communications. The new ruling came in judging the case of Romanian engineer
Read Here�
download file now