Why You Need to Mature Your User Behavior Analytics Deployment

User behavior analytics (UBA) can help security teams uncover ignorant, negligent and malicious activity with advanced machine learning algorithms — but Rome wasn’t built in a day.

The post Why You Need to Mature Your User Behavior Analytics Deployment appeared first on Security Intelligence.

Continue reading Why You Need to Mature Your User Behavior Analytics Deployment

How to secure a domain name from insider threats, domain hijacking in a corperate context?

Usually there’s just one e-mail / e-mail password / domain registrar username / password. And perhaps one 2FA (google authenticator) device and a 2FA recovery code.

Either an employee has access to these credentials or not. … Continue reading How to secure a domain name from insider threats, domain hijacking in a corperate context?

Employee Hacks: Spotting Insider Threats

Organizations face security threats such as data breaches from numerous sources, however many only consider attacks from external sources. However, 60 percent of attacks are the result of trusted insiders with access to sensitive intellectual property… Continue reading Employee Hacks: Spotting Insider Threats

National Cyber Security Awareness Month: What’s New for 2018?

To kick off October, we take a look back at what happened in cybersecurity in 2018 and a sneak peek at this year’s National Cyber Security Awareness Month.

The post National Cyber Security Awareness Month: What’s New for 2018? appeared first on Security Intelligence.

Continue reading National Cyber Security Awareness Month: What’s New for 2018?

Amazon Hit from Within, Employees Leak Proprietary Data for Profit

Insider threats are nothing to joke about — they are a real danger to companies worldwide, who often neglect them. In fact, they rank among the top six threats of 2018, according to statistics. A company will spend at least $8 million yearly on i… Continue reading Amazon Hit from Within, Employees Leak Proprietary Data for Profit

Your Business Should Be More Afraid of Phishing than Malware

The headlines love to talk about sophisticated hacking gangs, exploiting zero-day vulnerabilities to break their way into businesses and steal corporate data.
The post Your Business Should Be More Afraid of Phishing than Malware appeared first on … Continue reading Your Business Should Be More Afraid of Phishing than Malware

‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats

On Sept. 6, director Kelly Richmond Pope will discuss a case in which a small town official stole $53 million in public funds over two decades to illustrate the importance of managing insider threats.

The post ‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats appeared first on Security Intelligence.

Continue reading ‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats

Report: Nearly Half of Security Professionals Think They Could Execute a Successful Insider Attack on Their Organization

As potential threats and entry points into organizations’ databases keep growing, so does the amount of money folks are throwing at detecting and actioning insider threats. In fact, the ballooning amount of money being spent on cybersecurity over… Continue reading Report: Nearly Half of Security Professionals Think They Could Execute a Successful Insider Attack on Their Organization

Demystifying Insider Threats

Insider threats are a growing concern for many organizations in large part because there is so much confusion around how they are defined. Security experts across all sectors interpret insider threats differently, thus assigning them different levels … Continue reading Demystifying Insider Threats

These 5 Types of Insider Threats Could Lead to Costly Data Breaches

Insider threats are not only the most common cause of cybersecurity risk, but also the costliest and hardest to detect.

The post These 5 Types of Insider Threats Could Lead to Costly Data Breaches appeared first on Security Intelligence.

Continue reading These 5 Types of Insider Threats Could Lead to Costly Data Breaches