Anonymous ID: 7b1c4e Dec. 23, 2017, 12:39 p.m. No.158230   🗄️.is 🔗kun

>>156848

>CrowdStrike

 

Detect. Hunt. Respond.

 

What is CrowdStrike? It’s our competition Anons.

 

Vault7

 

WikiLeaks recently began a new series of leaks on the United States Central Intelligence Agency, codenamed Vault 7. It is the largest ever publication of confidential documents on the CIA—and, according to WikiLeaks, “eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.”

 

WikiLeaks tweeted the leak, and claims the information came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia. Thus surfacing yet another case of insider threat within the U.S. Government.

 

https:// www.observeit.com/blog/vault-7-wikileaks-reveals-need-user-activity-monitoring-analytics/

 

How do you detect and apprehend users who have gone rogue? User activity monitoring or User Behavior Analytics (UBA) is very important for CISOs, and it’s very important for the CIA after Vault7.

Enter E8 Security. E8 Security’s UBA is the CIA’s equivalent of “weaponized autism”. E8’s technology provides the ability to connect the dots. It gives CIA bad actors the ability to hunt and find good actors (white hats).

 

http:// e8security.com

 

Matt Jones, CEO of E8 Security, explained that his company aims to differentiate from others in the market by looking at other factors beyond just users, including network and endpoint traffic.

 

Who is E8? E8 Security is CrowdStrike’s chief featured technology partner.

 

https:// www.crowdstrike.com/partners/technology-partners/

 

While users are a core focus for E8 Security, Jones emphasized that organizations don't have a user behavior analytics problem; rather, the problem is understanding what's running inside a network and how to stop rogue actions.

 

Machine Learning Component (AI)

 

Looking at the technology inside of E8 Security, Jones said the company is making of use of what has now become a standard big data analytics stack across the security industry. The stack includes Apache Hadoop and Spark and then some machine learning capabilities on top.

 

http:// labs.eweek.com/security/e8-security-raises-12m-for-behavior-intelligence