Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Can User Behavior Analytics Do a Better Job of Protecting Your Organization's Data?

BY Jason Straight
February 01, 2017

IT security professionals will tell you that the bulk of spending on cybersecurity in large organizations in recent years has been toward perimeter tools like firewalls, antivirus systems and signature-based digital gatekeeping systems. And yet the relentless pace of major data breaches has shown no signs of letting up.

Why? In part it's because the perimeter itself is eroding. The benefits of mobility and round-the-clock productivity are simply too compelling for most organizations to ignore, and the result is that more and more devices are accessing enterprise networks. Organizations continue to outsource more functions to non-employee contractors and vendors, who often require network access to be effective. And the much-hyped “Internet of Things” (IoT) opens networks up to yet another huge class of “authorized devices,” which can be exploited to orchestrate significant mischief, as the recent hacker attack on the Internet infrastructure company Dyn demonstrated so decisively, achieving sustained disruptions of service from some of the world's most prestigious online properties, including Netflix, Twitter, Amazon and Tumblr.

So, while spending at many organizations still tends to focus on perimeter defenses, security experts have begun to face the reality that it is nearly impossible to keep bad actors out of your network, and are turning their attention to better ways of mitigating threats posed by intruders once they've hacked their way in. Of course, it's not just hacker-instigated breaches from which we need to defend. Recent surveys suggest that insider threats — from trusted employees and other authorized users in possession of legitimate credentials — account for somewhere between 20% and 60% of today's data breaches, and perimeter defenses are not equipped to stop them. Awareness of the potential danger of insider attacks, in fact, is an important factor in an upsurge in interest among cybersecurity professionals in user behavior analytics (UBA).

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models Image

Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.

Hyperlinked Documents: The Latest e-Discovery Challenge Image

As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.

Identifying Your Practice's Differentiator Image

How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.

Risks and Ad Fraud Protection In Digital Advertising Image

The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.

Turning Business Development Plans Into Reality Image

This article offers practical insights and best practices to navigate the path from roadmap to rainmaking, ensuring your business development efforts are not just sporadic bursts of activity, but an integrated part of your daily success.