Insider threats and the misuse of privileged credentials

35% of IT professionals see themselves as the biggest internal security risk to networks within their organisation, according to new research from Balabit. Biggest insider risk IT professionals may understand what their most valuable assets are, but th… Continue reading Insider threats and the misuse of privileged credentials

Only 12% or organizations are likely to detect a sophisticated cyber attack

Organizations believe that today’s cyber threat landscape places them at high risk of cyber attacks. The EY survey of nearly 1,200 C-level leaders of the world’s largest and most recognized organizations examines some of the most urgent con… Continue reading Only 12% or organizations are likely to detect a sophisticated cyber attack

The Emperor’s New Insider Threats

The Emperor was the greatest CISO in the land. His castle was as safe as could be, and there were no insider threats to be found — or so he thought.

The post The Emperor’s New Insider Threats appeared first on Security Intelligence.

Continue reading The Emperor’s New Insider Threats

How to Get the Most Out of Data Loss Prevention Technology to Improve Insider Threat Detection

Yesterday, I attended our webinar, “How to Unlock the Full Potential of Insider Threat Tools,” and it got me thinking about the relationship between technology and past successes of insider …

The post How to Get the Most Out of Data Loss Prevention Technology to Improve Insider Threat Detection appeared first on Delta Risk.

The post How to Get the Most Out of Data Loss Prevention Technology to Improve Insider Threat Detection appeared first on Security Boulevard.

Continue reading How to Get the Most Out of Data Loss Prevention Technology to Improve Insider Threat Detection

Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

To deal with the daily pressures of the job, CISOs need a cybersecurity strategy that promotes cross-departmental collaboration and clear communication.

The post Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity appeared first on Security Intelligence.

Continue reading Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

Recent NSA leaks show challenge of a software ‘solution’ for insider threats

Two recent thefts of NSA documents were made possible simply because workers who handled sensitive material decided to walk out the door with some of it, serving to highlight challenges facing the U.S. intelligence community as it seeks to implement, and in some cases create, next generation insider threat programs. Former U.S. intelligence officials tell CyberScoop the rudimentary nature of these incidents makes it extremely difficult to create programs that keep material secure without negatively impacting workforce morale. “It’s impossible to totally stop from what I can see,” said a former U.S. intelligence official who spoke on condition of anonymity to discuss their experience. “There’s just way too many people walking in and out for nothing to get stolen.” Newly released court documents provide details about recent leaks of classified documents to The Intercept, a national security focused news publication known for its work with Edward Snowden. A transcript of an interview with […]

The post Recent NSA leaks show challenge of a software ‘solution’ for insider threats appeared first on Cyberscoop.

Continue reading Recent NSA leaks show challenge of a software ‘solution’ for insider threats

Inadequate IT processes continue to create major security and compliance risks

The results of a study of more than 900 IT security professionals, conducted by Dimensional Research, spotlights how common security best practices – such as timely removal of access to corporate data and applications, dormant account identification, and role administration – continue to be a challenge and concern for organizations worldwide. How confident are you that all former users are fully de-provisioned in a timely manner? Deprovisioning accounts Most alarmingly, 70 percent of respondents express … More Continue reading Inadequate IT processes continue to create major security and compliance risks

Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey

Identity governance and administration process engineering remains a challenge despite growing awareness about the importance of IGA and IAM processes.

The post Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey appeared first on Security Intelligence.

Continue reading Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.

The post See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management appeared first on Security Intelligence.

Continue reading See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management