Palm Beach Gardens, FL, USA
Nov 19, 2019   |  By Dr. Christine Izuakor
According to IBM, it takes an average of 197 days to detect a breach. Today's attackers go above and beyond to evade alerting capabilities and make it look like they were never there. While that number tends to be shorter for Insider Threats, Insiders also tend to be much better at deception and covering their tracks as well.
Oct 18, 2019   |  By Dr. Christine Izuakor
The agriculture sector is a staple of critical global infrastructure. We need food to survive as human beings, and a loss of access to these assets could be physically and emotionally detrimental to hundreds of millions of people. The sector is made up of numerous organizations that support critical functions such as growing crops, raising animals, and harvesting fish and other animals from a farm, ranch, or their natural habitats.
Oct 14, 2019   |  By Dr. Christine Izuakor
At the end of 2018, 30 million small businesses were operating in the United States, many of which relied on a variety of technologies to deliver their services. No matter how small in size or how new on the startup scene, these growing companies often face the same cyber risks that large and well-established companies face.
Oct 7, 2019   |  By Dr. Christine Izuakor
As we quickly approach the last quarter of the year, it's a good time to reflect on what's happened thus far in 2019, and where we should focus our energy for 2020.
Sep 25, 2019   |  By Dr. Christine Izuakor
Aviation is a component of critical infrastructure that is comprised of a complex web of public and private organizations relying on millions of assets to move people and cargo around the world. The industry supports countless critical functions such as emergency response, community access, agricultural support, passenger services, national security, law enforcement, border security, intermodal connections to rail and shipping, and much more.
Aug 23, 2018   |  By Veriato
Since you’re reading this guide, it’s likely you recognize the threat insiders pose to an organization and the need to proactively build a plan to monitor, detect, and respond to potential and active threats. Insiders pose a real threat – 28% of data breaches are perpetrated by insiders, and institutional fraud is almost always an insider.
Jun 26, 2018   |  By Veriato
Organizations focused on security threats tend to focus on the external attacker. Solutions used to secure the perimeter, endpoints, email, and data are put in place. While absolutely necessary, they organizations lack the ability to equally protect against the insider – the employee that puts the organization at risk through either malicious intent or negligence.
May 30, 2018   |  By Veriato
Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you’ve “trusted” them as part of their employment, but when the time comes to change jobs, you can’t always be certain about the motive for the move.
May 11, 2018   |  By Veriato
The results of the SANS survey on insider threats show that organizations are starting to recognize the importance of protecting against the insider threat but struggle to deal with it; as one might expect, larger organizations are more likely to have provisions for responding to such threats.
May 10, 2018   |  By Veriato
The class of cyber actor with the greatest capacity to cause harm to organizations is not the so called state-sponsored hacker or cyber-terrorists. It is the “insider” – the company’s employees, ex-employees, and trusted vendors.
Nov 11, 2019   |  By Veriato
Too many organizations are still failing to prioritize mitigating the risk posed by Insiders, whether they're malicious actors or model employees who make mistakes that unintentionally lead to a data breach.
Oct 24, 2019   |  By Veriato
Data is currency online and on the dark web where social security numbers sell for $1 each, debit or credit card numbers as much as $110, and passports and medical records $1,000 or more. Without deep visibility into user activity within an organization, suspicious behaviors that signal fraud may go unnoticed and insiders can profit by selling your sensitive data.
Aug 27, 2019   |  By Veriato
Insider threats have become the Achilles' heel of most corporate security strategies that rely primarily on access management, network analysis or trying to lock down sensitive documents.
Aug 22, 2019   |  By Veriato
How criminals extort businesses using RansomWare services from the DarkWeb.
Aug 20, 2019   |  By Veriato
Insider Threats - Are they the hole in your security strategy?