When it comes to identifying and stopping malicious and even accidental insider threats, organizations are often overlooking a significant gap. Nathan Hunstad of Code42 discusses how to plug this costly leak.
In this interview about the insider threat, Hunstad discusses:
Why organizations are overlooking the IP...
People cause data breaches every day. That simple statement hides layers of complexity, compliance issues, and stress for CISOs and their security teams. While we may be able to 'logically' explain malicious breaches by linking them to motivations such as financial gain, it's often more difficult to understand and...
Join Enterprise Strategy Group (ESG) and Dtex Systems to get a detailed look at a newly released ESG Research Insights Report, "Insider Threat Program Realities." Based on the survey of 300 security and IT professionals in the US, the report underscores the continued struggle most organizations face when it comes to...
With continued data breaches occurring, and heavy fines making headlines, the time is now to think more proactively about applying granular access controls to protect your unstructured data from accidental and malicious data loss.
In this webinar, we will look at typical use cases and demands - in particular data...
The 2019 Insider Data Breach survey gathered responses from 252 U.S. and 253 U.K.-based IT leaders (CIOs, CTOs, CISOs and IT Directors) and 2004 U.S. and 2003 U.K.-based employees to assess the root causes of these employee-driven data breaches, as well as the frequency and impact of such instances.
Download the...
Unix and Linux build the foundation for most business-critical systems. Thus, they present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, security teams must follow an integrated approach, covering both privilege elevation and centralized...
As a general rule, negligent incidents are far more common than malicious ones. Negligent insiders are employees that unintentionally jeopardize security, often through well-intentioned ignorance, laziness, or simple human error.
While many security teams make the mistake of focusing exclusively on would-be malicious...
Since 2011, the US federal government has required agencies to establish insider threat detection and prevention programs. What are the elements of a successful insider threat program, and how can these help non-government entities improve their own defenses and regulatory compliance? The CERT Insider Threat Center at...
Some of the biggest health data breaches - including headliner Wall of Shame breaches in 2018 - are due to insiders who click on phishing emails, and fall for business email compromise scams. While there is also plenty of record snooping by insiders, healthcare also has its share of malicious bad actors looking to...
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? Join this session to hear our expert offer:
The latest research on insider...
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the...
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. We've heard how this shady underworld is the refuge of the cybercriminal elite and even nation state threat actors.
But beyond the hype there is the potential for dark web sources to reveal valuable...
Having access to threat intelligence can arm you to make more
confident, risk-based decisions. However, simply having it is not
enough. 58 percent of organizations have had some kind of threat
intelligence program for at least two years, but struggle to
operationalize the intelligence efficiently - 39...
The Recorded Future buyer's guide will help you to answer 11 key questions at the center of deciding how to invest in a threat intelligence solution. A template is also included to help build an RFP you can use to quiz vendors on their capabilities.
The guide includes:
Definitions of types of threat intelligence...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.