Veriato Blog

Tag Results

  • What is User and Entity Behavior Analytics?

    by Veriato | Nov 23, 2018
    • Machine Learning
    • Security Threat
    • Security Solution
    • ueba
    UEBA sets baselines for human activity and also for the activity of the machines connected to the network.
    Full story
  • To cloud, or not to cloud. That is the question.

    by Stephen Voorhees, CISSP | Mar 21, 2017
    • Private Cloud
    • Security Solution
    • Cloud
    If you are thinking about storing sensitive information in the cloud, you need to be as sure of the security of that data as you would be storing it on your own infrastructure.
    Full story
  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    • Data Leaks
    • Security Solution
    • IP Theft
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at TechCrunch.com.
    Full story
  • Can you keep a secret?

    by Mike Tierney | Sep 02, 2015
    • Protect Data
    • Security Solution
    According to USPTO.gov, trade secrets consist of information and can include formulas, patterns, compilations, programs, devices, methods, techniques or processes.
    Full story
  • Are we counting on a Maginot Line?

    by Mike Tierney | Jun 15, 2015
    • Employee Monitoring
    • Security Solution
    • Data Leaks
    • Data Protection
    A whole lot of time and money gets spent preventing acts or behaviors from happening.
    Full story
  • Veriato impacts UK police force

    by Mike Tierney | May 08, 2015
    • Security Solution
    • Monitoring Software
    • Monitoring
    The concept of gathering evidence from digital media has evolved from a reactive process relying on law enforcement officers being able to seize and forensically examine computers, tablets and mobile phones.
    Full story