Monday, July 16: Dtex, Insider Threat News: Privileged User Dents Apple Self-Driving Car Program; DOJ Says Russia Hacked Clinton Campaign, Issues Indictments Against Spies

Last week, Apple found out it had an insider threat active in its ranks. It was the type of insider that Dtex and the industry commonly refers to as a “leaver.” In this case, the leaver also happened to be a privileged user. A leaver is someone w… Continue reading Monday, July 16: Dtex, Insider Threat News: Privileged User Dents Apple Self-Driving Car Program; DOJ Says Russia Hacked Clinton Campaign, Issues Indictments Against Spies

Gargoyle: Innovative solution for preventing insider attacks

A group of researchers from UNSW Sydney, Macquarie University, and Purdue University has released a paper on a new and very promising network-based solution for preventing insider attacks. Dubbed Gargoyle, the solution: Evaluates the trustworthiness of… Continue reading Gargoyle: Innovative solution for preventing insider attacks

An Opportunity for Innovation: Preventing Bank Fraud in the Face of SWIFT, NPP, and Evolving Technology

It should be no surprise to anyone, least of all security teams, that technology is ever-evolving. But while this constant innovation enables so much good in the business world, it also presents a daunting challenge for cybersecurity to match pace. The… Continue reading An Opportunity for Innovation: Preventing Bank Fraud in the Face of SWIFT, NPP, and Evolving Technology

Monday, July 9: Dtex, Insider Threat, Privacy News: California Passes West Coast GDPR; Insider Threat Too Much Even for Security Company; Drones, Law Enforcement, Activity Monitoring and Transparency

May and June were huge months for privacy. July is already big for the Insider Threat. In May, GDPR enforcement commenced. In June, The United States Supreme Court ruled that law enforcement agencies must have a warrant to search cellphone location dat… Continue reading Monday, July 9: Dtex, Insider Threat, Privacy News: California Passes West Coast GDPR; Insider Threat Too Much Even for Security Company; Drones, Law Enforcement, Activity Monitoring and Transparency

Monday, July 2: Dtex – Insider Threat News: Harris Poll Reveals that Employees Support Monitoring, SC Magazine’s ‘Women in Security 2018’ Features Christy Wyatt, Human Error Leads to Amgen Data Breach Copy

We are focused on helping our customers and the security industry to detect insider threats. As part of our commitment, we frequently engage in research that reveals how to improve related technology and human processes. Last week, we announced th… Continue reading Monday, July 2: Dtex – Insider Threat News: Harris Poll Reveals that Employees Support Monitoring, SC Magazine’s ‘Women in Security 2018’ Features Christy Wyatt, Human Error Leads to Amgen Data Breach Copy

72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline

Without a data breach response plan, companies will find it difficult to disclose security incidents within 72 hours as required by the General Data Protection Regulation (GDPR).

The post 72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline appeared first on Security Intelligence.

Continue reading 72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline

7 Questions for Evaluating your Security Posture against Insider Threats

Insider threats top the list of the most dangerous cyber risks for organizations worldwide. It doesn’t take much effort for insiders to steal your sensitive data, while such activities are hard to discover and impossible to prevent. Unfortunately… Continue reading 7 Questions for Evaluating your Security Posture against Insider Threats

Monday, July 2: Dtex – Insider Threat News: Harris Poll Reveals that Employees Support Monitoring, SC Magazine’s ‘Women in Security 2018’ Features Christy Wyatt, Human Error Leads to Amgen Data Breach

We are focused on helping our customers and the security industry to detect insider threats. As part of our commitment, we frequently engage in research that reveals how to improve related technology and human processes. Last week, we announced th… Continue reading Monday, July 2: Dtex – Insider Threat News: Harris Poll Reveals that Employees Support Monitoring, SC Magazine’s ‘Women in Security 2018’ Features Christy Wyatt, Human Error Leads to Amgen Data Breach

Preempt raises $17.5 million in Series B for enterprise threat management

San Francisco enterprise threat management company Preempt Security earned $17.5 million in its Series B funding round, the company announced on Wednesday. Preempt says that it uses information about identity, behavior and risk within a company to proactively catch insider threats and prevent breaches. Management of such threats is a constant struggle for enterprises, as they need to ensure that employees don’t willingly or inadvertently expose sensitive information. CEO Ajit Sancheti told CyberScoop that Preempt can anticipate and stop both malicious insiders and unwittingly compromised users by monitoring their privileges and behavior on the network. Preempt can force users to validate their identity via multi-factor authentication if it senses something is awry. “Internal threats are difficult to detect since the behavior of the malicious users or the compromised accounts are difficult to differentiate from legitimate users. Since Preempt can force the verification of identity of a user in real time […]

The post Preempt raises $17.5 million in Series B for enterprise threat management appeared first on Cyberscoop.

Continue reading Preempt raises $17.5 million in Series B for enterprise threat management

Former NSA contractor Reality Winner accepts guilty plea for leaking classified report

Former National Security Agency contractor Reality Winner accepted a guilty plea agreement on Tuesday. For one count of espionage, Winner faces 63 months in prison and three years of supervised release. She originally faced ten years in prison. Final sentencing is yet to come. Winner, 26, is a former Air Force linguist who then worked as a contractor for the NSA in Georgia where she printed out classified material about the Russian government’s attempts at interference in U.S. elections and mailed the file to a reporter at The Intercept. The report was published on June 5, 2017. Winner had already been arrested two days earlier. “All of these actions I did willfully, meaning I did them of my own free will,” she said at Tuesday’s hearing. Winner’s lawyers and family pointed to the Espionage Act, a century-old piece of legislation routinely criticized as draconian, as the reason she pleaded guilty on Tuesday. “The […]

The post Former NSA contractor Reality Winner accepts guilty plea for leaking classified report appeared first on Cyberscoop.

Continue reading Former NSA contractor Reality Winner accepts guilty plea for leaking classified report