The rise of the super malicious insider: Yes, we need to worry

DTEX Systems announced the release of a report which identifies a significant increase in industrial espionage incidents and the rise of the super malicious insider persona, and provides evidence that the abrupt shift to remote work has directly contri… Continue reading The rise of the super malicious insider: Yes, we need to worry

The four types of remote workers your security awareness program must address

No matter how much technology you acquire or how many specific technical controls you install, when it comes to your information security awareness program, the most important control to tune within your environment is your people. I’m not telling you … Continue reading The four types of remote workers your security awareness program must address

Smashing Security podcast #260: New hire mystery, hacktivist ransomware, and digi-dating

Who’s that new guy working at your company, and why don’t you recognise him from the interview? How are hacktivists raising the heat in Belarus? And should you be fully vaxxed for your online date?

All this and much more is discussed in the latest … Continue reading Smashing Security podcast #260: New hire mystery, hacktivist ransomware, and digi-dating

How costly is an insider threat?

Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent $15.4 million annually on overall insider threat remediation and took 85 day… Continue reading How costly is an insider threat?

How do IT leaders plan to overcome remote work security challenges?

Two years ago, IT leaders were forced into remote work. Many viewed it as a temporary experiment. Today, they see it for what it is: the future of work. And they’ve made it their top priority. According to the results of a Citrix Systems and Pulse surv… Continue reading How do IT leaders plan to overcome remote work security challenges?

The rising threat of cyber criminals targeting cloud infrastructure in 2022

In the world of cybersecurity, combating threats is like playing endless, hyper-advanced, multidimensional Whack-A-Mole: new threats are always emerging, often from unexpected sources, and trying to keep up can feel impossible. The threats are constant… Continue reading The rising threat of cyber criminals targeting cloud infrastructure in 2022

The public sector is more concerned about external than internal threats

SolarWinds announced the findings of its Public Sector Cybersecurity Survey Report. This survey includes responses from 400 IT operations and security decision makers, including 200 federal, 100 state and local, and 100 education respondents. “These re… Continue reading The public sector is more concerned about external than internal threats

Data security in the age of insider threats: A primer

Of course, your employees are diligent, security conscious and loyal. But the real world tells a different story. A grand total of 94% of organizations had an insider data breach in the past year, with 84% of the data breaches resulting from human erro… Continue reading Data security in the age of insider threats: A primer

Insider threat does not have to be malicious, so how do you protect your organization?

In this interview with Help Net Security, Laura Hoffner, Chief of Staff at Concentric, talks about the causes of insider threat attacks and what companies can do to mitigate or even avoid them. In these particularly tumultuous times, when organizations… Continue reading Insider threat does not have to be malicious, so how do you protect your organization?

When employees leave, is your data walking out the door?

In the second quarter of 2021, American workers began resigning from their jobs at a historic rate. The “Great Resignation”, as it’s since been dubbed, has seen the U.S. set monthly records for the number of workers leaving their jobs three times this … Continue reading When employees leave, is your data walking out the door?