Real damage done by malicious, careless and compromised insiders

A recent OnePoll survey has revealed some surprising results regarding malicious insiders. 36 percent of surveyed companies experienced security incidents involving malicious employees in the past twelve months, and one in fifty employees is believed to be a malicious insider. According to a recent report from Gartner, “While insider data thefts are often anticipated when employees leave an organization, our research suggests many insiders with bad intentions have no intention of leaving but prefer to … More Continue reading Real damage done by malicious, careless and compromised insiders

Can Big Data analytics strengthen your security posture?

The Ponemon Institute released the results of its first report focused on how big data analytics are being used by organizations to strengthen cybersecurity postures. Their findings are based on a survey with responses from 592 IT and IT security practitioners from US-based organizations across multiple industries. Key findings 72 percent said big data analytics played an important role in detecting advanced cyberthreats 72 percent said it is impossible to get ahead of advanced threats … More Continue reading Can Big Data analytics strengthen your security posture?

Take Advantage of Security Cheat Codes With Behavioral Intelligence

Behavioral intelligence helps analysts understand behavior patterns to sniff out insider threats before they occur — a kind of cheat code for IT security.

The post Take Advantage of Security Cheat Codes With Behavioral Intelligence appeared first on Security Intelligence.

Continue reading Take Advantage of Security Cheat Codes With Behavioral Intelligence

Cybercriminals select insiders to attack telecom providers

Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also recruiting disillusioned employees through underground channels and blackmailing staff using compromising information gathered from open sources. Telecommunications providers are a top target for cyber-attacks. They operate and manage the world’s networks, voice and data transmissions and store vast amounts of sensitive data, and this makes them a highly attractive target for cybercriminals … More Continue reading Cybercriminals select insiders to attack telecom providers

Privileged user abuse and the insider threat

Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are unnecessarily granting access to individuals beyond their roles or responsibilities with 91 percent predicting the risk of insider threats will continue to grow or stay the same. “Insider threat will always be an issue, because how can you ever guarantee that your staff will all take the right course … More Continue reading Privileged user abuse and the insider threat

Get the Identity Governance Scoop: Interview With an Expert

To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM’s identity and access management specialists.

The post Get the Identity Governance Scoop: Interview With an Expert appeared first on Security Intelligence.

Continue reading Get the Identity Governance Scoop: Interview With an Expert

Organizations still unprepared for malicious insiders

Organizations globally believe they are their own worst enemy when it comes to cybersecurity, with 45 percent saying they are ill-equipped to cope with the threat of malicious insiders and twice as many, 90 percent, calling malicious insiders a major threat to the organizations’ security, according to Mimecast. “Companies’ IT security priorities usually change depending on different factors, among which the budget and the threat vectors are the most important for most. If last week … More Continue reading Organizations still unprepared for malicious insiders