Please turn on your JavaScript for this page to function normally.
Top tips to protect systems against insider misuse

The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …

US govt is after another secret document leaker

It seems that there is a leaker following in the footsteps of Edward Snowden, and US government officials are trying to discover his or her identity, as they confirmed for the …

Looking at insider threats from the outside

Cybersecurity is a never-ending battle requiring around-the-clock attention. From malware to DDoS to APT attacks, front-line IT security teams are being constantly bombarded. …

Are your third-party vendors leaving the door open to hackers?

By now, every security professional in the world should know the story about Fazio Mechanical Services. The Pennsylvania-based company specializes in heating, air conditioning …

Employee behaviors expose organizations to insider threat

A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection. The research was conducted by OnePoll and based on surveying …

Insider threat and privileged user abuse

Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a …

Are rogue employees the biggest threat to information security?

Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014. The poll …

SANS revamps its Memory Analysis Course

To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete …

Half of IT pros make undocumented changes to IT systems

57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …

Businesses take little action to mitigate the insider threat

While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …

The insider threat is growing

Vormetric and Ovum surveyed more than 500 IT decision-makers at mid and large size organizations in the UK, France and Germany. They found that only nine percent of businesses …

800M exposed records make 2013 record year for data breaches

Despite oft repeated claims that the insider threat is the one organizations should be looking out for, the numbers and statistics related to 2013 data breaches show that risk …

Don't miss

Cybersecurity news