Tag "Insider Threats"

Back to homepage
Hardware/Network

Why data loss prevention is a throwback technology

Times are changing, and traditional cybersecurity tools are no longer enough to protect an organization’s assets. Black Hat 2018 may be behind us, but the trends, conversations and news coming

Industry Insights

43% of Security Pros Could Execute Insider Attack

A recent survey of nearly 200 IT professionals about insider threats found that nearly half of the participants believed they could successfully attack their organizations from the inside. In a blog

Identity Theft

How did the TimeHop data breach happen?

Compromise of an employee’s credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts

Industry Insights

Training Customer Service Agents To Become Security Defenders

There is no such thing as ‘designing an artificial intelligence (AI) strategy’ because AI should be part of the business strategy. Before you start designing an AI system, ask yourself

Hardware/Network

What Tesla’s Spygate Teaches Us About Insider Threats

The saga involving a malicious insider at Tesla keeps getting stranger. Already there have been several fascinating twists and turns, well-chronicled in the press and on social media. Whatever the truth is,

Cloud

Departing Employees Should Not Mean Departing Data

Empowering your employees to do their best work means providing them access to physical and digital assets in the company network that can help them scale their initiatives. But when

Hardware/Network

Innovation in healthcare: A hacker’s dream and CISO’s nightmare?

It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the potential to do truly great things

Industry Insights

Top six security and risk management trends

Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner said that security leaders should harness this increased support and take advantage of six

Hardware/Network

5 Breakthrough Technologies to Combat Insider Threats in 2018

Insider threats are on the rise. When companies traditionally look outwards for security threats, they should be looking inwards towards their most trusted asset, employees. Employees have access to sensitive

Software

Addressing the threat from within

How can businesses encourage employees to take cyber security as seriously as they do? When it comes to cyber security, employees are often too laid back. It could be that