Step 1: Implement user threat detection. Step 2: Have a glass of wine.
In my previous blog posts, I talked about pattern-based vs. rules-based user behavior analytics (UEBA), modeling user activity to build behavioral baselines, and the advantages of…