2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from 2017 that could continue into 2018.

The post 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar appeared first on Security Intelligence.

Continue reading 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

Five Steps for Investigating and Responding to Employee Fraud

In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future.

The post Five Steps for Investigating and Responding to Employee Fraud appeared first on Security Intelligence.

Continue reading Five Steps for Investigating and Responding to Employee Fraud

Five Surprising Reasons to Invest in Better Security Training

Security training programs should go beyond the basics and address why phishing attacks, social engineering schemes and other insider threats impact employees personally.

The post Five Surprising Reasons to Invest in Better Security Training appeared first on Security Intelligence.

Continue reading Five Surprising Reasons to Invest in Better Security Training

Changes to Data Breach Notifications in the Air

Ever since the first data breach notification law went into effect July 1, 2003 in California (SB 1386), there has been controversy surrounding what types of data being exposed should trigger data breach notifications, who should be notified, and … Continue reading Changes to Data Breach Notifications in the Air

A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My Postgre Database to Start Mining Monero

The third in our deep dive on database attacks, “A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My Postgre Database to Start Mining Monero.” Read on to find out.
The post A Deep Dive into Database Attacks [Part… Continue reading A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My Postgre Database to Start Mining Monero

Tracking Malicious Insiders: Catch Me If You Can

A UBA solution powered by machine learning enables security teams to model normal behavior and track subtle changes in user activity to identify malicious insiders.

The post Tracking Malicious Insiders: Catch Me If You Can appeared first on Security Intelligence.

Continue reading Tracking Malicious Insiders: Catch Me If You Can

Hunting for Insider Threats: Using Activity Modeling to Detect Suspicious Database Commands and Access Patterns

The Widening Gap Data breaches by insiders are very challenging to catch. The gap between the rise of insider threats and speed of hunting them down is increasingly widening. According to 2017 Data Breach Investigation Report by Verizon, a great majori… Continue reading Hunting for Insider Threats: Using Activity Modeling to Detect Suspicious Database Commands and Access Patterns

Insider Enterprise Threats: Focusing on the Technology

This article is part 2 of 3 in the “Insider Enterprise Threats” series, outlining effective policies and practices for combating insider cyber security threats to the modern enterprise. In the first part of this series, we examined the seri… Continue reading Insider Enterprise Threats: Focusing on the Technology

Difference between legitimate file transfer vs data exfiltration of confidential files using FTP

I have FTP logs and some other logs assuming that corporate environment is actively monitored. How would I know that user is using ftp to transfer regular file and not using the same to transfer confidential file from an orga… Continue reading Difference between legitimate file transfer vs data exfiltration of confidential files using FTP

4 Steps to Monitor and Audit Privileged Users of Data Stores

Privileged database users can become an insider threat. Here are four steps to monitor and audit privileged users of data stores so you are immediately aware of anomalous activity and potential malicious behavior.
The post 4 Steps to Monitor and Audit … Continue reading 4 Steps to Monitor and Audit Privileged Users of Data Stores