Monday, June 25: Dtex, Insider Threat in the News: Dtex CEO Christy Wyatt Speaks to Dark Reading about Tesla Insider Attack, NBC about Privacy and SCOTUS Cell Phone Decision; Tech’s Mega Players Meeting Wednesday to Talk Privacy and Regulation

The United States Supreme Court last week ruled in ‘Carpenter v. United States’ that the Fourth Amendment of the US Constitution requires law enforcement agencies to obtain a search warrant to access individuals’ cellphone location hi… Continue reading Monday, June 25: Dtex, Insider Threat in the News: Dtex CEO Christy Wyatt Speaks to Dark Reading about Tesla Insider Attack, NBC about Privacy and SCOTUS Cell Phone Decision; Tech’s Mega Players Meeting Wednesday to Talk Privacy and Regulation

Army Cyber Command brings in outside help to fight insider threats

Two companies announced Thursday a $6.5 million contract award to help the United States Army Cyber Command shore up counterintelligence efforts. Applied Insight and DV United will work in tandem to support Army Cyber Command (ARCYBER) with its User Activity Monitoring Program (UAM). The two companies have experience handling cyber weapons systems, insider threat analysis and computer network defense for the Pentagon and the wider intelligence community. Greg Walker, president of Applied Insights, told CyberScoop that prior partnerships with the Army, Air Force and FBI were key to fostering trust and securing the ARCYBER contract. Thomas Dalton, chief operating officer of DV United, voiced similar sentiments. “Our deep experience providing cyber and information security mission solutions to the government has assisted in securing federal networks, combating cybercrime and protecting critical infrastructure,” Dalton said in a press release. Over five years, the two companies will monitor user activity, identify potential insider […]

The post Army Cyber Command brings in outside help to fight insider threats appeared first on Cyberscoop.

Continue reading Army Cyber Command brings in outside help to fight insider threats

How to Strengthen Your Cyber Security DNA

Cyber security is a complex animal that requires many disciplines and a diverse toolkit. Typically, resources are limited, and incident response and security staff are overloaded with noise, irrelevant alerts and incomplete static information. &#1… Continue reading How to Strengthen Your Cyber Security DNA

Tesla CEO Elon Musk Accuses Employee of ‘Extensive and Damaging Sabotage’

A disgruntled employee at Tesla has caused “extensive and damaging sabotage,” according to the company’s CEO Elon Musk. In an email sent to employees late Sunday night, Musk revealed an employee had broken into the company’s com… Continue reading Tesla CEO Elon Musk Accuses Employee of ‘Extensive and Damaging Sabotage’

Tesla saboteur caused extensive damage and leaked highly sensitive data, claims Elon Musk

Tesla CEO Elon Musk believes that the company is the victim of deliberate sabotage perpetrated by an employee. According to CNBC, the high profile executive sent an email to Tesla employees this weekend alleging that there was a saboteur in the company… Continue reading Tesla saboteur caused extensive damage and leaked highly sensitive data, claims Elon Musk

The Greatest Cybersecurity Threats are Inside Your Own Walls

Most companies have invested significantly in technology to protect their systems and data from hackers. But what’s often overlooked in cybersecurity—the human element—is just as dangerous, if not more dangerous. IBM reported in 2014 … Continue reading The Greatest Cybersecurity Threats are Inside Your Own Walls

How to Protect Your Organization From Within

While stories of international espionage and government-sponsored hack attacks may captivate public attention, cyber security threats that originate from inside an organization pose a remarkably large threat. In fact, research suggests that insider thr… Continue reading How to Protect Your Organization From Within

The Inadvertent Insider Threat: A CISO Confronts a Breach From Within

Human error, credential misuse and disgruntled employees aren’t the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.

The post The Inadvertent Insider Threat: A CISO Confronts a Breach From Within appeared first on Security Intelligence.

Continue reading The Inadvertent Insider Threat: A CISO Confronts a Breach From Within