CyberFact of the Moment Manned by data scientists with backgrounds in military cyberintel, CloudLock’s CyberLab works to bring you the latest trends, threat prevention tips, and…

CyberFact of the Moment

CloudLock CyberLab

Founded by Israeli Elite Cybersecurity Military Intelligence experts, the CloudLock CyberLab is a global team of leading security experts, analysts, penetration testers, incident responders, forensic investigators and security researchers focused on driving unique insight into cybersecurity threats related to the cloud.

Share

Manned by data scientists with backgrounds in military cyberintel, CloudLock’s CyberLab works to bring you the latest trends, threat prevention tips, and cyber intelligence. With the largest customer base in the market, our data scientists are able to aggregate anonymized data points across more than 101,000 apps, 10 million users, and the 1 billion files CloudLock monitors daily, to uncover deeply nuanced patterns and provide cutting edge updates to help organizations securely leverage the cloud.

This Just In From The CloudLock CyberLab

It’s amazing what User and Entity Behavior Analytics (UEBA) can uncover when it comes to compromised accounts. In one instance, as reported in the CyberLab’s latest cybersecurity report, one university had a single user account that accessed corporate data from 82 countries within a two-week timeframe. 

This type of geographic anomaly needs to be spotted quickly, and investigated thoroughly, as this type of travel could only be accomplished by a fictional superhero. Upon widening their scope and averaging the data across our entire customer base, the CyberLab found the following trend: 

Cyberfact-8-q1-report (1)

How Do You Spot Truly Suspicious User Behaviors?

Read the cybersecurity report for more details on geographic anomalies and other suspicious user behaviors. Plus, learn about the new Cloud Threat Funnel methodology which makes the most of cybersecurity efforts by pinpointing suspicious activities that truly indicate cyberthreats.

The Cloud Threat Funnel: Suspicious User Behavior That Matters

Share
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close