Fired sysadmin pleads guilty to doxxing five senators on Wikipedia

Cosko, 27, pleaded guilty to five counts including making public restricted personal information, computer fraud, witness tampering and obstruction of justice, Continue reading Fired sysadmin pleads guilty to doxxing five senators on Wikipedia

Only 12% of enterprises are consistently able to detect insider threats

73 percent of IT professionals believe that insider attacks have become more frequent in the past year. Additionally, 59 percent said that their organizations experienced at least one insider attack over the last 12 months. As corporate data moves to m… Continue reading Only 12% of enterprises are consistently able to detect insider threats

What is shadow mining and why is it a security threat?

The majority of organizations are overlooking the threat of shadow mining, with 65 percent of organizations unfamiliar with the term and more than half (57 percent) unfamiliar with the wider-but-related threat of cryptojacking. Cryptojacking is an exte… Continue reading What is shadow mining and why is it a security threat?

Ex-NSA contractor pleads guilty to vast classified data leak, faces 9 years in prison

A former National Security Agency contractor accused of one of the largest breaches of classified data in U.S. history pleaded guilty Thursday to one felony count and faces over six more years in federal prison. Appearing solemn and weary in federal court in Baltimore, Harold T. Martin III, 54, seemed to embrace his fate, telling the judge more than once, “It’s time [to] close Pandora’s Box.” Martin, who worked as an intelligence contractor for multiple firms for over two decades, allegedly stole some 50 terabytes of data that included details of sensitive NSA policies and cyber operations. Prosecutors said he stashed numerous computers and storage devices with classified data on his Maryland property. Under the plea deal, Martin, a former Navy lieutenant, faces nine years in prison and another three years of supervised release. He will be credited for the more than two years he has already served in custody […]

The post Ex-NSA contractor pleads guilty to vast classified data leak, faces 9 years in prison appeared first on CyberScoop.

Continue reading Ex-NSA contractor pleads guilty to vast classified data leak, faces 9 years in prison

61% of CIOs believe employees leak data maliciously

There is a perception gap between IT leaders and employees over the likelihood of insider breaches. It is a major challenge for businesses: insider data breaches are viewed as frequent and damaging occurrences, of concern to 95% of IT leaders, yet the … Continue reading 61% of CIOs believe employees leak data maliciously

Most IT and security professionals feel vulnerable to insider threats

91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions such as Google Drive, Gmail, Dropbox and more. “The rise of… Continue reading Most IT and security professionals feel vulnerable to insider threats

Tax season scaries: How to keep your data safe from insider threats

With April 15 quickly approaching, companies across the country are rushing to get their taxes filed. This often requires third party specialists who are well-versed in corporate taxes and prepared to navigate new regulations. While the right contracto… Continue reading Tax season scaries: How to keep your data safe from insider threats

Podcast: Addressing Credential Compromise and Insider Threats Requires a New Security Approach

How can you secure an organization by using identity, behavior and risk? Preempt CEO Ajit Sancheti recently conducted an interview with Blog Talk Radio on how the enterprise perimeter is eroding – and what to do about it. Identity and Access Threa… Continue reading Podcast: Addressing Credential Compromise and Insider Threats Requires a New Security Approach

The Role of Privileged Access Management in Addressing Cybersecurity Challenges

Organizations spend over $100 billion globally on cybersecurity. In spite of that level of investment in cybersecurity and the attention paid to network security and data protection, major data breaches are still relatively common—and increasing…. Continue reading The Role of Privileged Access Management in Addressing Cybersecurity Challenges