gurucul.com
Detecting low and slow insider threats
Machine learning offers new ways to ID abuse by trusted users In my last post I discussed how machine learning could be used to detect phishing-based account compromise attacks using a real-world use case from the recent Verizon Data Breach Digest. This time I’ll examine how to detect insider thre