Access Analytics & User Behavior (UEBA) Implementation: From Theory to Detection

Access Analytics & User Behavior (UEBA) Implementation: From Theory to Detection TL;DR UEBA promises to detect the undetectable. Insider threats. Compromised accounts. Advanced persistent threats that waltz past your firewall, EDR, and SIEM like they own the place. The pitch sounds amazing: establish behavioral baselines for every user, detect anomalies using machine learning, catch threats signature-based tools miss. John always logs in from Chicago? Sudden login from Moscow is anomalous....

December 29, 2025 · 29 min · Jay Klinkowsky

Identity Threat Detection & Response (ITDR) in Practice: Building Detection Systems That Actually Work

Identity Threat Detection & Response (ITDR) in Practice: Building Detection Systems That Actually Work TL;DR Look, I’m going to be blunt: if you’re not monitoring identity like you monitor your network, you’re already compromised—you just don’t know it yet. Here’s what’s actually happening out there. The 2023 Verizon DBIR shows 74% of breaches involve stolen credentials or social engineering. That’s not a typo. Microsoft? They’re seeing 4,000+ password attacks per second on their infrastructure....

November 25, 2025 · 66 min · Jay Klinkowsky