Integrated Steps to Stay Ahead of Malicious Insiders

It is essential to allow access to data for your workforce, but you also must quickly detect and stop malicious insiders before they cause damage.

The post Integrated Steps to Stay Ahead of Malicious Insiders appeared first on Security Intelligence.

Continue reading Integrated Steps to Stay Ahead of Malicious Insiders

Insider Attacks May Be Closer Than They Appear

Security policies and employee education are just two of the many ways that organizations can mitigate the threat of insider attacks.

The post Insider Attacks May Be Closer Than They Appear appeared first on Security Intelligence.

Continue reading Insider Attacks May Be Closer Than They Appear

Bank Teller or Robber? Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin

Are insiders leading to data breaches within your organization? The right security tools and analytics can help you find out — and prevent these incidents.

The post Bank Teller or Robber? Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin appeared first on Security Intelligence.

Continue reading Bank Teller or Robber? Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin

Reduce Risk With a Proactive Security Assessment

CISOs and security leaders who take a proactive security approach can dramatically reduce risk and better prepare organizations for a security incident.

The post Reduce Risk With a Proactive Security Assessment appeared first on Security Intelligence.

Continue reading Reduce Risk With a Proactive Security Assessment

Industry reactions to the Mossack Fonseca data breach

The Panama Papers, a collection of 11.5 million files leaked from Panama-based law firm Mossack Fonseca, are now online. The documents show in detail just how exactly the world’s 1 percent manipulate offshore wealth. Here are some of the comments Help Net Security received. Philip Lieberman, President of Lieberman Software The implications of law firm breaches are mind boggling since parties within lawsuits provide full disclosure of their chosen law firms as a matter of … More Continue reading Industry reactions to the Mossack Fonseca data breach

Insider threat protection with the DB Networks DBN-6300

Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new approach. Those who were once considered trustworthy may have lost their credentials to an attacker and are now posing an insider threat. This is why identifying compromised credentials in real-time has proven elusive until now. The situation has changed, and so must the mechanisms to mitigate the risk. In this podcast recorded at … More Continue reading Insider threat protection with the DB Networks DBN-6300

Who’s on First? Creating a Data Security Roster to Safeguard Data From Insiders

Organizations need to understand their data security, and this starts with knowing who has access to critical data and where those users reside.

The post Who’s on First? Creating a Data Security Roster to Safeguard Data From Insiders appeared first on Security Intelligence.

Continue reading Who’s on First? Creating a Data Security Roster to Safeguard Data From Insiders

Under the Radar: How to Protect Against the Insider Threat

Organizations must combat the risk of an insider threat with access controls, management and monitoring for privileged accounts.

The post Under the Radar: How to Protect Against the Insider Threat appeared first on Security Intelligence.

Continue reading Under the Radar: How to Protect Against the Insider Threat

Your iPhone will Alert You if You are Being Monitored At Work

Are You an Employee?

It’s quite possible that someone has been reading your messages, emails, listening to your phone calls, and monitoring your activities at work.

No, it’s not a spy agency or any hacker…

…Oops! It’s your Boss.

Recently, European Court had ruled that the Employers can legally monitor as well as read workers’ private messages sent via chat software like WhatsApp or

Continue reading Your iPhone will Alert You if You are Being Monitored At Work