{"id":25441,"date":"2022-10-11T21:50:13","date_gmt":"2022-10-11T21:50:13","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25441"},"modified":"2022-10-19T21:30:53","modified_gmt":"2022-10-19T21:30:53","slug":"behavioral-analytics-cybersecurity-does-it-work","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/","title":{"rendered":"Behavioral Analytics in Cybersecurity: Does It Work as Advertised?"},"content":{"rendered":"\n<p>In the ever-evolving fight against <a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">data loss<\/a>, data breaches, and data theft in the 21st century, organizations worldwide have turned to a number of cybersecurity solutions, services, and software in an attempt to keep their data safe and secure from threats.<\/p>\n\n\n\n<p>One such solution is behavioral analytics, more specifically User and Entity Behavior Analytics (UEBA). UEBA utilizes algorithms and machine learning to track anomalous behavior not just from users within a certain network but also the routers, servers, and endpoints making up that network. UEBA has been growing for some time, and a <a href=\"https:\/\/www.marketdataforecast.com\/market-reports\/user-and-entity-behavior-analytics-market\" target=\"_blank\" rel=\"noreferrer noopener\">2022 Market Data Forecast report<\/a> predicts its global market size to grow from $890.7 million in 2019 to $1.1 billion by 2025. UEBA is also increasingly becoming a feature in core cybersecurity products like <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDR<\/a> so it&#8217;s growing in ways that standalone market figures don&#8217;t completely capture.<\/p>\n\n\n\n<p>However impressive these numbers may be, they don\u2019t answer the question of whether UEBA actually works as promised to stop cybersecurity threats. Moreover, what about other behavioral analytics methods in cybersecurity? How much good can those accomplish? So, those are some of the questions we\u2019re hopefully going to answer today.<\/p>\n\n\n\n<p><strong>Want to Find the UEBA Solution That\u2019s Right for You? <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Check Out Best User and Entity Behavior Analytics (UEBA) Tools for 2022<\/strong><\/a><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6d68ec18de\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6d68ec18de\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#What-Is-Behavioral-Analytics\" title=\"What Is Behavioral Analytics?\">What Is Behavioral Analytics?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#Why-Use-Behavioral-Analytics-in-Cybersecurity\" title=\"Why Use Behavioral Analytics in Cybersecurity?\">Why Use Behavioral Analytics in Cybersecurity?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#Does-UEBA-Actually-Work\" title=\"Does UEBA Actually Work?\">Does UEBA Actually Work?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#Should-You-Use-Behavioral-Analytics\" title=\"Should You Use Behavioral Analytics?\">Should You Use Behavioral Analytics?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#Tips-for-Implementing-Behavioral-Analytics-in-Cybersecurity\" title=\"Tips for Implementing Behavioral Analytics in Cybersecurity\">Tips for Implementing Behavioral Analytics in Cybersecurity<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What-Is-Behavioral-Analytics\"><\/span>What Is Behavioral Analytics?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Despite the name evoking images of psychological or sociological analyses, behavioral analytics\u2019 origins cannot be found in academia but in the worlds of business and statistics. Behavioral analytics is essentially a subgenre of business analytics, the iterative investigation of past business performance to generate insight when making decisions.<\/p>\n\n\n\n<p>There are a number of different ways to perform this sort of investigation. Whether it&#8217;s studying the performance of your direct competitors, using predictive analytics to determine what the future may hold for your industry, or analyzing employee performance and making optimization decisions based on that information, the entire point is to take data in and use it to make better-informed decisions.<\/p>\n\n\n\n<p>Behavioral analytics specifically combines machine learning and big data analytics in concert to take in users\u2019 behavioral data and identify trends, anomalies, and patterns based on this data. \u201cUsers\u201d in this case can mean your employees, your customers, or just anyone who directly interfaces with your business and your business\u2019s data on a regular enough basis to generate patterns.<\/p>\n\n\n\n<p>A common use case for behavioral analytics is on eCommerce or media platforms. From the Netflix algorithm that provides you with recommendations on what to watch next based on what you\u2019ve already watched to a meal-delivery platform like GrubHub or DoorDash offering you restaurant-specific discounts based on your ordering history, there are a number of ways that companies leverage your past activity on their platforms to generate insights and predictions in order to keep you spending money with them.<\/p>\n\n\n\n<p><strong>Interested in Seeing What Else Machine Learning Is Doing in Cybersecurity? Read <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Hyperautomation and the Future of Cybersecurity<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why-Use-Behavioral-Analytics-in-Cybersecurity\"><\/span>Why Use Behavioral Analytics in Cybersecurity?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Data gathering and analysis can be beneficial in cybersecurity too of course. Information is one of the most powerful tools users and enterprises have when combatting data breaches, leaks, and data loss.<\/p>\n\n\n\n<p>Additionally, behavioral analytics is uniquely-suited to the goals of many organizations\u2019 cybersecurity plans. Cybercriminals, much like criminals in the physical world, tend to look for the path of least resistance when infiltrating an area. In the world of cybersecurity, the path of least resistance has consistently been shown to be the human element, specifically user accounts with enough access privileges or credentials for the cybercriminal to execute their plan.<\/p>\n\n\n\n<p>According to a <a href=\"https:\/\/newsroom.ibm.com\/2020-07-29-IBM-Report-Compromised-Employee-Accounts-Led-to-Most-Expensive-Data-Breaches-Over-Past-Year\" target=\"_blank\" rel=\"noreferrer noopener\">2020 study<\/a> conducted by the Ponemon Institute and sponsored by IBM Security, 40% of what the study calls \u201cmalicious incidents\u201d occurred due to stolen\/compromised employee credentials or cloud misconfigurations. Compromised employee account login information was also the costliest infection vector for enterprises. On average, malicious incidents cost companies $3.86 million per breach according to the study, but when stolen credentials were involved, that number jumped to $4.77 million.<\/p>\n\n\n\n<p>By tracking user behavior, as well as anomalies within other parts of a network like servers or routers, companies have more opportunities to stop a data breach before it happens and potentially help save a business millions of dollars. This is part of the common sales pitch of top companies within the UEBA space like Cynet, IBM, Splunk, or Microsoft, but as with any cybersecurity offering, the technology isn&#8217;tt foolproof.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Does-UEBA-Actually-Work\"><\/span>Does UEBA Actually Work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Many companies tout their UEBA product as being \u201caccurate.\u201d This is common with software that utilizes machine learning or <a href=\"https:\/\/www.eweek.com\/big-data-and-analytics\/algorithms-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI algorithms<\/a> for classification purposes. For example, if a UEBA solution sounds the alarm on 10 anomalous instances in a day, and even 1 of them turned out to be a cybersecurity threat, the solution could be described as being able to accurately predict potential threats. Accuracy is absolutely important, but it isn\u2019t the only measurement needed for success with machine learning. Precision, how often a model identifies true positives instead of false positives, is just as vital.<\/p>\n\n\n\n<p>For UEBA specifically, false negatives or, more accurately, the lack of false negatives is often the most most important metric of all. Producing a number of false positives (being imprecise) is often preferable than allowing a false negative to slip by and cause your business to potentially lose millions. So, how good is UEBA at avoiding false negatives? The short answer is: \u201cit\u2019s complicated.\u201d<\/p>\n\n\n\n<p>In 2019, researchers from Southern Methodist University conducted a <a href=\"https:\/\/scholar.smu.edu\/cgi\/viewcontent.cgi?article=1074&amp;context=datasciencereview\" target=\"_blank\" rel=\"noreferrer noopener\">study<\/a> using behavioral analytics algorithms on network traffic to detect <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-stop-ddos-attacks-tips-for-fighting-ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS attacks<\/a>. In their findings, the performance of these algorithms varied wildly by type. Random Forest was the most accurate type of algorithm discussed, scoring 99% in both accuracy and precision. Meanwhile, Naive Bayes scored a dismal 26% in accuracy and 66% in precision.<\/p>\n\n\n\n<p>The type of anomaly being detected also affected performance. While most algorithms performed well against the HULK DDoS tool, none of them were able to accurately identify bot-generated DDoS attacks. This might be due in part to the small sample size of bot attacks that researchers had access to, however.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8855782\" target=\"_blank\" rel=\"noreferrer noopener\">2018 paper<\/a> published by the Institute of Electrical and Electronics Engineers (IEEE) highlights a specific flaw with UEBA:&nbsp;<\/p>\n\n\n\n<p>\u201cThe negative part of applying machine learning in UEBA is the same drawbacks that any machine learning brings. Machine learning has limitations dealing with privileged users, developers, and knowledgeable insiders. Those users represent a unique situation because their job functions often require irregular behaviours. This cause[s] difficulties for statistical analysis to create a baseline [for] the algorithms. Another drawback is that UEBA can\u2019t indicate the long-term sophisticated \u2018low and slow&#8217; as attacks because they [do] not have day to day impact and become as if non-existent.\u201d<\/p>\n\n\n\n<p>In other words, UEBA, like other machine learning-based solutions, is at its best when the tasks it is trying to accomplish are simple, predictable, and have easy-to-identify patterns. Users who need to operate in harder-to-predict patterns, like developers or executives or subject matter experts, will give UEBA a tougher time.<\/p>\n\n\n\n<p>David Movshovitz, co-founder and CTO of Israeli cybersecurity firm RevealSecurity, told <em>eSecurity Planet<\/em>:<\/p>\n\n\n\n<p>\u201cIn classical UEBA, you try to look at each operation by itself\u2026 You try to learn statistical quantities like\u2026 \u2018the average number of emails you send\u2019&#8230; We claim that this average is a mathematical quantity but has no meaning from a real behavior perspective\u2026 And if I may, I would give an example. I would talk about myself as a CTO. There are days where I am busy preparing a presentation. So, very few emails, working mainly with [Microsoft] Office. Other days, I\u2019m working on some bug in the product, and then I will rarely do emails, don\u2019t touch files, only working on the system, on the logs, analyzing\u2026\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized td-caption-align-right\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-801x1024.jpeg\" alt=\"David Movshovitz, CTO and Co-Founder of RevealSecurity.\" class=\"wp-image-25444\" width=\"200\" height=\"256\" title=\"movshovitz-headshot-revealsecurity\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-801x1024.jpeg 801w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-235x300.jpeg 235w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-768x981.jpeg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-150x192.jpeg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-300x383.jpeg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-696x889.jpeg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity-1068x1365.jpeg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/movshovitz-headshot-revealsecurity.jpeg 1192w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><figcaption>David Movshovitz, CTO and Co-Founder of RevealSecurity<\/figcaption><\/figure>\n\n\n\n<p>It should be noted, however, that Movshovitz is shunning UEBA in favor of his company\u2019s own behavioral analysis product which, according to them, better tracks cybersecurity threats by building what they call \u201cuser journeys.\u201d User journeys essentially track the sequencing of user actions to provide what they claim is a more accurate picture of potential cybersecurity threats. This is in contrast to UEBA, which generally treats each user action as its own individual data point laid out on a timeline.<\/p>\n\n\n\n<p>When asked for data to support the company\u2019s claims of superior performance, Movshovitz replied:<\/p>\n\n\n\n<p>\u201cThis is not a theoretical claim. We have working systems on customers\u2019 business applications, on-prem, custom-built, and SaaS, and I can give you numbers. For example, we are monitoring a Salesforce application on one of the large insurance companies in Israel, and because we are layering these profiles, we are generating about one alert once a week or even once every two weeks\u2026 We are monitoring Microsoft 365 users by a very large bank in Europe\u2026 and we are generating about 10-12 alerts a week, something like once or twice a day.\u201d&nbsp;<\/p>\n\n\n\n<p>Although RevealSecurity didn&#8217;t provide data to support its approach, Movshovitz\u2019s criticisms of UEBA have some validity. While good at detecting certain types of threats like DDoS attacks, the more it deals with actual human users whose on-network activities can vary wildly between days, the less effective it becomes. For some types of businesses, this won\u2019t be an issue. For others, it can be a complete dealbreaker.<\/p>\n\n\n\n<p>Essentially, UEBA can work, but it won\u2019t necessarily work as a one-size-fits-all solution to your cybersecurity threat detection needs. Like other human-facing AI products like chatbots, it struggles to provide meaningful insight when confronted with situations outside of its expected datasets, situations which human users can provide all too often. However, using UEBA in concert with other solutions, as well as expert staff, can make it a relatively effective tool in the right scenarios.<\/p>\n\n\n\n<p><strong>Want to Learn More About Some of the Best Cybersecurity Solutions Out There? Take a Look at <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/esecurity-planet-2022-cybersecurity-product-awards\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>eSecurity Planet\u2019s 2022 Cybersecurity Product Awards<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Should-You-Use-Behavioral-Analytics\"><\/span>Should You Use Behavioral Analytics?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There is some discussion to be had regarding the ethical considerations surrounding behavioral analytics in cybersecurity. UEBA can run into some of the same issues that other cybersecurity solutions, such as employee monitoring, do and are compounded by the use of AI and machine learning as part of its product.<\/p>\n\n\n\n<p>To focus on the cybersecurity aspect first, there is the problem of what data your UEBA solution is taking in. If it\u2019s just data collected during the user\u2019s work hours or while they are using company hardware\/software, it\u2019s probably fine as long as you make that monitoring clear to the user in advance. Transparency is key whenever you\u2019re collecting user data. As long as the user is fully aware of what data is being collected and what that data is being used for, it\u2019s much easier to develop trust with that user.<\/p>\n\n\n\n<p>Now, let\u2019s turn to the ethical problems AI and machine learning specifically can bring into the mix. This quote from a 2021 <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2666389921002245\" target=\"_blank\" rel=\"noreferrer noopener\">ScienceDirect article<\/a> discussing ethical guidelines within a hypothetical AI insurance system sums it up nicely: \u201cThe AI system is often treated as a discrete technical system or even as a black box, which presents an almost intractable problem because it is so complicated and therefore difficult to explain.\u201d<\/p>\n\n\n\n<p>The \u201cblack box\u201d problem, as it\u2019s called, is common in the AI space and directly relevant to UEBA and UEBA-related products. In fact, RevealSecurity co-founder and CEO Doron Hendler stated in a 2021 <a href=\"https:\/\/www.israeldefense.co.il\/en\/node\/51321\" target=\"_blank\" rel=\"noreferrer noopener\">interview<\/a> with IsraelDefense that his company\u2019s dream for its product was \u201cto have a black box where you can upload your logs and receive answers.\u201d<\/p>\n\n\n\n<p>Black box solutions are difficult to effectively deploy in cybersecurity. While users can usually view the input and output of a black box, the internal processes are obscured, and this obscurity harms the trustworthiness of the product. While a security vendor may rightly wish to protect the proprietary information and intellectual property contained in a black box solution, transparency is often the best way to assure employees, customers, and any others who interface with your network that your cybersecurity technology is not potentially being used to abuse the people it\u2019s meant to monitor. It\u2019s also best for customers in a market where <a href=\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\" target=\"_blank\" rel=\"noreferrer noopener\">some reports<\/a> show 90% of buyers aren\u2019t getting the effects they were promised.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tips-for-Implementing-Behavioral-Analytics-in-Cybersecurity\"><\/span>Tips for Implementing Behavioral Analytics in Cybersecurity<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To understand how to implement behavioral analytics in cybersecurity, a good place to start is to first understand the ways in which UEBA is different from another popular form of analytics: cohort analytics.<\/p>\n\n\n\n<p>Cohort analytics can look very similar to UEBA at first blush. It takes data from product or service usage, like a streaming or eCommerce platform, and organizes that data into a series of groups based on related characteristics. Called cohorts, these groups are usually measured by their shared common characteristic over a specified length of time, such as what time of day Netflix users aged 18-49 tend to watch TV shows vs. what time of day they tend to watch movies.<\/p>\n\n\n\n<p>The key differences between cohort analysis and UEBA are twofold. First, cohort analysis is typically used in marketing and advertising circles, and its success or failure will not entirely sink a business. By contrast, UEBA being used in cybersecurity makes it more essential to keeping the company afloat by hopefully preventing damaging data breaches.<\/p>\n\n\n\n<p>Second, UEBA tends to be a bit more granular in the way it parses data. UEBA is focused on detecting anomalies and tracking patterns that don\u2019t conform to whatever statistically-expected patterns are set for it. So while it might group things together based on specific characteristics like login time or time spent within a certain application.<\/p>\n\n\n\n<p>In terms of implementation, data collection is key to making effective use of UEBA. Pairing it with big data analytics can be a great way to boost UEBA capabilities. UEBA relies on machine learning and AI to process and analyze the datasets it is given, and the more data it has, the better it can find patterns and anomalies that might otherwise escape notice, similar to SIEM systems that have begun <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-data-lakes-address-siem-limitations\/\" target=\"_blank\" rel=\"noreferrer noopener\">storing log and security data in data lakes<\/a>.<\/p>\n\n\n\n<p>Next, make sure you have experts in both machine learning and cybersecurity working together to manage your UEBA solution. Whether it\u2019s a platform bought from a major enterprise or one of the many great open source machine-learning tools available, the best way to maximize the benefits of UEBA is to make sure you have the best people you can find working on it and fine-tuning it.<\/p>\n\n\n\n<p>Finally, be flexible. Cybercriminals are, naturally, trying to avoid detection the best they can, and like any good criminals, they\u2019re constantly evolving their methods and looking for new vulnerabilities to exploit. As such, it\u2019s important that you be open to reiterating your detection and analytical methods whenever necessary to stay as far ahead of hackers as you can. Make sure UEBA is backed up by other cybersecurity solutions and experts to ensure your data is as safe as possible.<\/p>\n\n\n\n<p><strong>Looking for More Cybersecurity Resources? Check Out <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Top Endpoint Detection &amp; Response (EDR) Solutions in 2022<\/strong><\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d68ebf2cd-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d68ebf2cd\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d68ebf2cd\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d68ebf2cd\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d68ebf2cd\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d68ebf2cd\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d68ebf2cd\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the ever-evolving fight against data loss, data breaches, and data theft in the 21st century, organizations worldwide have turned to a number of cybersecurity solutions, services, and software in an attempt to keep their data safe and secure from threats. One such solution is behavioral analytics, more specifically User and Entity Behavior Analytics (UEBA). [&hellip;]<\/p>\n","protected":false},"author":305,"featured_media":25449,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22],"tags":[31965,3790,730,7393,28046],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[382,395,389,376,31777],"class_list":["post-25441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","tag-behavioral-analytics","tag-cybersecurity","tag-security","tag-security-analytics","tag-ueba","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-application-security-vulnerability-management","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-managed-security-services","b2b_product-security-services","b2b_product-ueba"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Behavioral Analytics in Cybersecurity: Does It Work? | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Behavioral analytics is found in many popular cybersecurity tools and solutions. We want to find out if it works as advertised.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Behavioral Analytics in Cybersecurity: Does It Work? | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Behavioral analytics is found in many popular cybersecurity tools and solutions. We want to find out if it works as advertised.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-11T21:50:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T21:30:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zephin Livingston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zephin Livingston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\"},\"author\":{\"name\":\"Zephin Livingston\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f\"},\"headline\":\"Behavioral Analytics in Cybersecurity: Does It Work as Advertised?\",\"datePublished\":\"2022-10-11T21:50:13+00:00\",\"dateModified\":\"2022-10-19T21:30:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\"},\"wordCount\":2532,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg\",\"keywords\":[\"behavioral analytics\",\"cybersecurity\",\"security\",\"Security Analytics\",\"UEBA\"],\"articleSection\":[\"Applications\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\",\"name\":\"Behavioral Analytics in Cybersecurity: Does It Work? | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg\",\"datePublished\":\"2022-10-11T21:50:13+00:00\",\"dateModified\":\"2022-10-19T21:30:53+00:00\",\"description\":\"Behavioral analytics is found in many popular cybersecurity tools and solutions. We want to find out if it works as advertised.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg\",\"width\":512,\"height\":512,\"caption\":\"Computer screen with a mouse pointer hovering over the word \\\"security.\\\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Behavioral Analytics in Cybersecurity: Does It Work as Advertised?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f\",\"name\":\"Zephin Livingston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg\",\"caption\":\"Zephin Livingston\"},\"description\":\"Zephin Livingston is a content writer for eSecurityPlanet with years of experience in multiple fields including cybersecurity, tech, cultural criticism, and media literacy. They're currently based out of Seattle.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/zephin-livingston\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Behavioral Analytics in Cybersecurity: Does It Work? | eSecurity Planet","description":"Behavioral analytics is found in many popular cybersecurity tools and solutions. We want to find out if it works as advertised.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/","og_locale":"en_US","og_type":"article","og_title":"Behavioral Analytics in Cybersecurity: Does It Work? | eSecurity Planet","og_description":"Behavioral analytics is found in many popular cybersecurity tools and solutions. We want to find out if it works as advertised.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/","og_site_name":"eSecurity Planet","article_published_time":"2022-10-11T21:50:13+00:00","article_modified_time":"2022-10-19T21:30:53+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg","type":"image\/jpeg"}],"author":"Zephin Livingston","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Zephin Livingston","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/"},"author":{"name":"Zephin Livingston","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f"},"headline":"Behavioral Analytics in Cybersecurity: Does It Work as Advertised?","datePublished":"2022-10-11T21:50:13+00:00","dateModified":"2022-10-19T21:30:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/"},"wordCount":2532,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg","keywords":["behavioral analytics","cybersecurity","security","Security Analytics","UEBA"],"articleSection":["Applications"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/","url":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/","name":"Behavioral Analytics in Cybersecurity: Does It Work? | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg","datePublished":"2022-10-11T21:50:13+00:00","dateModified":"2022-10-19T21:30:53+00:00","description":"Behavioral analytics is found in many popular cybersecurity tools and solutions. We want to find out if it works as advertised.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/behavioral-analytics-does-it-work-pixabay-pexels.jpeg","width":512,"height":512,"caption":"Computer screen with a mouse pointer hovering over the word \"security.\""},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Behavioral Analytics in Cybersecurity: Does It Work as Advertised?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f","name":"Zephin Livingston","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg","caption":"Zephin Livingston"},"description":"Zephin Livingston is a content writer for eSecurityPlanet with years of experience in multiple fields including cybersecurity, tech, cultural criticism, and media literacy. They're currently based out of Seattle.","url":"https:\/\/www.esecurityplanet.com\/author\/zephin-livingston\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25441"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/305"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25441"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25449"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25441"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25441"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25441"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}