Security information and event management (SIEM) frameworks are essential for enterprises to monitor, manage and mitigate the impact of evolving cyberattacks. As the number of threats and the financial impact…
Browsing Categoryinsider threat
Understanding the Cyber Risk Exposures Within the Health Care Industry
The health care industry is one of the most popular and lucrative targets for cyberattacks and malicious activity. Health care organizations always present as an attractive proposition to hackers as…
Zero Trust and Insider Threats: Was Brutus the Original Bad Actor?
Insider threats have been a problem for as long as there have been insiders. What’s changed over time? Well, for one, Brutus and his conspirators didn’t exactly leave a trail…
Don’t Make Headlines Over an Insider Incident: Lessons From the Frontlines
On the path to becoming more cyber secure, organizations across the globe spend an estimated $60 billion per year to defend their assets, recruit talent and work to prevent and…
Loving the Algorithm: User Risk Management and Good Security Hygiene
User risk management watches where people can’t. If you polled a random sampling of employees at various organizations, most would probably consider themselves security-minded. They would argue that they are…
Inadvertent Insider Threats Present a Unique Challenge to Organizations
According to the recent X-Force Threat Intelligence Index 2020, more than 8.5 billion records were exposed due to breaches in 2019, of which 86 percent were due to misconfigured assets.…
Trial for accused CIA leaker ends in hung jury
The US is expected to press for a retrial in the high-stakes trial of Joshua Schulte, suspected of raiding the CIA’s cyber arsenal. This post appeared first on Naked Security…
Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report
Today, I’m pleased to share some of the key findings from the 2020 Cost of Insider Threats Global Report. This is the third benchmark study, independently sponsored by IBM Security…
How to Start Building an Insider Threat Program
Sometimes, it only takes one moment — one life-changing incident — for the most trustworthy employee to become an insider threat. As Nick Cavalancia, founder of Microsoft MVP, observed at…
Desjardins’ employee from hell spills 2.9m records
The leak, carried out by a since-fired rogue employee, affected 2.7 million people and 173,000 businesses – about 41% of its clientele. This post appeared first on Naked Security Blog…