Eight Tactics for Circumventing Insider Security Threats

Fuse Relevant Security Data Organizations have large amounts of log, flow, packet, file, alert and threat feed data, which can yield intelligence for thwarting cyber-criminals. How? Correlate data so it is attributed to a user, a host or an application. Then distill it into summaries that provide rich context (authentication and device use histories, port-protocol relationships, etc.). Security analytics that use varied security data sources provide better visibility than do analytics using a single data source. Using correlation and distillation, security professionals are better positioned to discover hidden adversaries.


Link to Full Article: Eight Tactics for Circumventing Insider Security Threats