insider threat
What are users doing after log-in?
Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …
The enterprise security time bomb
Companies are at serious risk of data security breaches as 38 percent of U.S. office workers admit to storing work documents on personal cloud tools and services, according to …
Ex employee hacked into high-voltage power manufacturer’s network
A criminal complaint was unsealed on Thursday in federal court in the Eastern District of New York charging Michael Meneses – who was arrested earlier that day in …
Insider threats and BYOD still a great problem
Insider threats are the greatest concern and that permitting employees to connect their own devices to the network increases the risk of security breaches, according to …
Dell releases privileged access suite for Unix
At RSA Conference 2013 in San Francisco, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation …
Hidden security threats on enterprise networks
Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …
Cyber-Ark secures privileged accounts
Cyber-Ark Software announced its Privileged Identity Management Suite for Critical Infrastructure Protection (PIM/CIP), which secures critical infrastructure by preventing the …
Most effective ways to stop insider threat
Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …
Verdasys launches Digital Guardian 6.1
Verdasys announced Digital Guardian 6.1, an information protection platform that integrates compliance, insider threat prevention and cyber threat prevention. The release also …
Insider threat in financial services sector
When it comes to preventing insider fraud, financial organizations would do well to more closely monitor experienced, mid-level employees with years on the job, according to a …
Online file sharing poses great security risks
As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec. A new survey revealed that SMB …
Insider threat as prime security concern
Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …
Featured news
Resources
Don't miss
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)
- How to succeed at cybersecurity job interviews
- Meet ARGUS, the robot built to catch hackers and physical intruders
- Proxmox Mail Gateway: Open-source email security solution reaches version 9.0