Detecting and Monitoring Abnormal Login Activity with a Deterministic Rule-Based Approach
Most organisations focus their threat detection and prevention strategies on external actors, but internal threats can cause just as much harm. These threats are not always launched by malicious employees with intentions of inflicting damage, instead they can be caused…
Read More Telecommunication Security Use Cases
Posted by: Leonardo Hutabarat
Attacks made against telcos and internet service providers (ISPs) have steadily risen. Distributed denial of service (DDoS) attackers launched an 11-day attack against a Chinese telco in 2017 — breaking the DDoS record that year. That same year, Kaspersky Lab…
Read More How to Detect and Respond to SS7 Attacks — OT Telco Use Cases
Posted by: Leonardo Hutabarat
In the telecom environment, using Signaling System No.7 (SS7) protocol is very crucial, especially in 2G networks. If you’re wondering how SS7 works, SS7 protocol is an international telecommunications standard used to set up public switched telephone network (PSTN) and…
Read More Cybersecurity for Higher Education
Use cases for the higher education industry relating to: Data exfiltration, unauthorized access, detecting anonymous traffic and nation-state cyber espionage. The high volume of personal information and research data stored by higher education institutions, coupled with limited security budgets and…
Read More Securing Telehealth Systems and Patient Data
While telehealth has been around for several years, it gained significant traction during the global pandemic of 2020. As the number of affected individuals increased and uncertainty led to fear, the benefits of telehealth became clear. It enables at-risk populations…
Read More Securing Electronic Healthcare Records (EHRs) and Protecting Patient Privacy
Patient health records are worth more on the black market than any other data — and for good reason; they contain a treasure trove of extremely sensitive personal data. In addition to personally identifiable information (PII), health records can contain…
Read More