Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable.
The post Taming Network Chaos By Understanding User Behavior appeared first … Continue reading Taming Network Chaos By Understanding User Behavior

Companies face regulatory fines and cybersecurity threats, still fail to protect sensitive data

22% of a company’s folders are accessible, on average, to every employee, according to the new report from the Varonis Data Lab, which analyzed more than 54 billion files. The report shines a light on security issues that put organizations at risk from… Continue reading Companies face regulatory fines and cybersecurity threats, still fail to protect sensitive data

GE trade secret theft case demonstrates need for document behavior monitoring

A former GE engineer and a Chinese national have been formally charged with 14 counts of economic espionage by the U.S. Department of Justice after stealing trade secrets from GE. The indictment describes the calculated theft of sensitive documents rel… Continue reading GE trade secret theft case demonstrates need for document behavior monitoring

Insider Threats: How Can Enterprises Better Protect against this Growing Danger?

According to research from CA Technologies, over half of cybersecurity professionals, or 53 percent, have confirmed an insider attack against their own organization in the past 12 months. These insider threats have had disastrous, sometimes even tragic… Continue reading Insider Threats: How Can Enterprises Better Protect against this Growing Danger?

Employers should develop cybersecurity protocols and invest more in employee training programs

Organizations want to trust their employees when it comes to cybersecurity, but to do so, they need to better leverage technology. The ObserveIT global survey of 600 IT leaders across various industries found that employers should develop clear cyberse… Continue reading Employers should develop cybersecurity protocols and invest more in employee training programs

Which employees receive the most highly targeted email-borne threats?

Workers in R&D/Engineering are the most heavily targeted group of employees within organizations, a new Proofpoint report says, and lower-level employees are at a higher risk of email-borne cyber threats than higher-level management roles and exec… Continue reading Which employees receive the most highly targeted email-borne threats?

Insider Threat Management – Detect and Respond to Data Exfiltration

As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration

Insider Threat Management – Detect and Respond to Data Exfiltration

As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration

Your Supply Chain May Be a Trojan Horse

No organization exists in vacuum. There is no such thing as a completely self-sustaining company that does not in some way depend on suppliers, partners, and service providers. Businesses use products and services from other companies to manage and gro… Continue reading Your Supply Chain May Be a Trojan Horse

Manufacturing sector most vulnerable to insider threats

Almost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious insiders (35%) ahead of account compromise (26%) as their leading concern. Small e… Continue reading Manufacturing sector most vulnerable to insider threats