A Closer Look at the Attempted Ransomware Attack on Tesla

Cybersecurity is in the news again with the disclosure that Tesla, working in conjunction with the FBI, prevented a ransomware attack from being launched at its Gigafactory in Nevada. The cybercriminals targeted Tesla through one of its employees, whom… Continue reading A Closer Look at the Attempted Ransomware Attack on Tesla

Rogue Shopify staff accessed customer records, says ecommerce platform investigating security breach

Shopify, the major ecommerce platform which powers many online stores, has revealed that it suffered a serious breach of security at the hands of two rogue employees.

Read more in my article on the Hot for Security blog. Continue reading Rogue Shopify staff accessed customer records, says ecommerce platform investigating security breach

Rogue Shopify Staff Accessed Customer Records, Says Ecommerce Platform Investigating Security Breach

Members of Shopify’s support team abused access to company network Customer contact information and order details accessed FBI and international law enforcement agencies are investigating Shopify, the major ecommerce platform which powers many online s… Continue reading Rogue Shopify Staff Accessed Customer Records, Says Ecommerce Platform Investigating Security Breach

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing this evolving threat.
The post Strategies for In… Continue reading Strategies for Insider Threat Mitigation

Credential Theft on the Rise, in Part Due to Remote Work

Credential theft has been on the rise in recent years; more than 80% of hacks are the result of credential theft (most of it coming from successful phishing attempts), according to the 2020 “Verizon Data Breach Investigations Report.” This… Continue reading Credential Theft on the Rise, in Part Due to Remote Work

Mapping the motives of insider threats

Insider threats can take many forms, from the absent-minded employee failing to follow basic security protocols, to the malicious insider, intentionally seeking to harm your organization. Some threats may stem from a simple mistake, others from a perso… Continue reading Mapping the motives of insider threats

The cost of an insider attack is as much as $2 million

Employees, whether careless or malicious, can pose a great risk to organizations, a Bitglass survey reveals. 61% of survey respondents reported at least one insider attack over the last 12 months (22% reported at least six separate attacks). Insider th… Continue reading The cost of an insider attack is as much as $2 million