Getting on the Right Track With a Security Immune System

An integrated security immune system can help IT teams cope with the evolving threat landscape that is outpacing traditional solutions.

The post Getting on the Right Track With a Security Immune System appeared first on Security Intelligence.

Continue reading Getting on the Right Track With a Security Immune System

The decline of cyber resilience: Organizations unprepared to face attacks

Only 32 percent of IT and security professionals say their organisation has a high level of cyber resilience – down slightly from 35 percent in 2015, according to a global study involving 2,400 security and IT professionals, conducted by the Ponemon Institute. The 2016 study also found that that 66 percent of respondents say their organisation is not prepared to recover from cyberattacks. For the second straight year, the study showed that challenges with incident … More Continue reading The decline of cyber resilience: Organizations unprepared to face attacks

Tesco Bank hack shows that attackers continue to follow easy money

What happens when nearly 9,000 accounts at a financial institution experience fraudulent activity and clients have nearly £2.5 million stolen? People notice. The bank notices and shuts down activity, raising a chilling question for financial institutions: “Is this the new normal for banking in the age of cyber crime?” As we continue to learn more about the Tesco Bank hack, we may get confirmation that this was an inside job. One misunderstood aspect of insider … More Continue reading Tesco Bank hack shows that attackers continue to follow easy money

Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence

An effective identity governance and intelligence solution enables IT leaders to manage and monitor the levels of access granted to each individual user.

The post Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence appeared first on Security Intelligence.

Continue reading Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence

Insider Threats, Industrial Sabotage and Game Theory: Part 2

When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.

The post Insider Threats, Industrial Sabotage and Game Theory: Part 2 appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory: Part 2

Data Breaches and the Importance of Account Protection and Incident Response

Data breaches can be devastating to an organization. Defense against data breaches starts and ends with account protection and incident response.

The post Data Breaches and the Importance of Account Protection and Incident Response appeared first on Security Intelligence.

Continue reading Data Breaches and the Importance of Account Protection and Incident Response

Machine Learning for Threat Analytics: A Boost or a Bust?

Machine learning relies on data acquisition and classification of examples to help security teams and threat analysts reduce the rate of false positives.

The post Machine Learning for Threat Analytics: A Boost or a Bust? appeared first on Security Intelligence.

Continue reading Machine Learning for Threat Analytics: A Boost or a Bust?

1 in 3 organizations have experienced an insider attack in the last year

A new Bitglass report on insider threats in the enterprise found that, in a third of organizations surveyed, careless or malicious user behavior resulted in data leakage, up slightly from a year ago. 56 percent of respondents believe insider leaks have become more frequent in the last year. “Adoption of cloud and BYOD are positive developments, but organizations that have limited cross-app visibility will struggle to detect anomalous behavior and need to rethink their approach … More Continue reading 1 in 3 organizations have experienced an insider attack in the last year

The insider threat is growing – don’t let poor internal security see you become a data breach victim

Iain Johnston – COO Employees can be one of a company’s most valuable assets. They form the backbone of business operations while also acting as your ambassadors to the general public. They can be your biggest advocates, but they can also be your biggest risk. The recent data breach of accountancy software provider Sage is […]

The post The insider threat is growing – don’t let poor internal security see you become a data breach victim appeared first on Semafone.

Continue reading The insider threat is growing – don’t let poor internal security see you become a data breach victim

The hidden cost of the insider threat

Organizations are spending an average of $4.3 million annually to mitigate, address, and resolve insider-related incidents – with that spend surpassing $17 million annually in the most significant cases, according to the Ponemon Institute. “External forces, or the possibility of an external attack, have commanded the focus and attention of today’s IT leaders with the perception that they pose the biggest threat to the enterprise,” said Dr. Larry Ponemon, Chairman and Founder of the Ponemon … More Continue reading The hidden cost of the insider threat