Who Watches the Watchers, Italian Style – Insider IP Theft at Leonardo

Two infosec team members are accused of attacking Leonardo’s systems to perpetrate IP theft, highlighting the real issue of insider threats One question often asked in security is whether an event is really a cyberattack when insiders are the on… Continue reading Who Watches the Watchers, Italian Style – Insider IP Theft at Leonardo

More than half of organizations don’t have an insider risk response plan

Both business and security leaders are allowing massive insider risk problems to fester in the aftermath of the significant shift to remote work in the past year, according to a Code42 report. During that same time, 76% of IT security leaders said that… Continue reading More than half of organizations don’t have an insider risk response plan

How can companies secure a hybrid workforce in 2021?

This has been a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how we live, work, and relate. For most businesses, this means a rapid and comprehensive shift toward remote work. While more tha… Continue reading How can companies secure a hybrid workforce in 2021?

Insider Threats: Risk Assessment Considerations for Remote Work

The outbreak of COVID-19 has led many businesses to transition a large number of employees to remote work. The shift could end up becoming a long-term trend; it’s expected to continue after the pandemic ends. Therefore, it is more important than ever t… Continue reading Insider Threats: Risk Assessment Considerations for Remote Work

Emerging Public Cloud Security Challenges in 2020 and Beyond

According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end of this year, up from $USD 227.8 billion just a year ago. Clearly, cloud computing is making its way to cloud nine, (See what I di… Continue reading Emerging Public Cloud Security Challenges in 2020 and Beyond

Cybercriminals Batter Automakers With Ransomware, IP Theft Cyberattacks

While the industry focus is on vehicle hacking, when it comes to the automotive industry cybercriminals are opting for less complex and sophisticated attacks – from phishing to ransomware. Continue reading Cybercriminals Batter Automakers With Ransomware, IP Theft Cyberattacks

Insider Threat Case Studies: Why You Need Advanced Behavior Analytics

We’ve talked a lot about Insider Threats.  They are a Big Deal™ and deserve the…
The post Insider Threat Case Studies: Why You Need Advanced Behavior Analytics appeared first on Gurucul.
The post Insider Threat Case Studies: Why You Need Advanced Beh… Continue reading Insider Threat Case Studies: Why You Need Advanced Behavior Analytics

Why Network Data Should be the Foundation of Your Security Strategy

The post Why Network Data Should be the Foundation of Your Security Strategy appeared first on Security Weekly. Continue reading Why Network Data Should be the Foundation of Your Security Strategy

Sysmon Endpoint Monitoring: Do You Really Need an EDR?

The post Sysmon Endpoint Monitoring: Do You Really Need an EDR? appeared first on Security Weekly. Continue reading Sysmon Endpoint Monitoring: Do You Really Need an EDR?