Palm Beach Gardens, FL, USA
Jan 8, 2020   |  By Dr. Christine Izuakor
Each day, we depend on energy for almost every kind of activity imaginable. Energy is required to keep lights on, enable transportation around the world, allow hospitals to operate, power the internet, and much more. Also termed the Oil and Gas sector, it’s considered a critical infrastructure sector by most nations around the world. This is because a loss of energy can cause a debilitating impact on the quality of human life.
Dec 9, 2019   |  By Dr. Christine Izuakor
While countless companies have found themselves in the headlines after being breached over the last decade, there are also many companies we never hear about. Why is that? What makes them so unique that they were never successfully breached before? Is it that they have top of the line security technology? Is it that they don't have assets that attackers care about? Or is it that they've just gotten lucky thus far? None of those common misconceptions are likely the true reason.
Nov 19, 2019   |  By Dr. Christine Izuakor
According to IBM, it takes an average of 197 days to detect a breach. Today's attackers go above and beyond to evade alerting capabilities and make it look like they were never there. While that number tends to be shorter for Insider Threats, Insiders also tend to be much better at deception and covering their tracks as well.
Oct 18, 2019   |  By Dr. Christine Izuakor
The agriculture sector is a staple of critical global infrastructure. We need food to survive as human beings, and a loss of access to these assets could be physically and emotionally detrimental to hundreds of millions of people. The sector is made up of numerous organizations that support critical functions such as growing crops, raising animals, and harvesting fish and other animals from a farm, ranch, or their natural habitats.
Oct 14, 2019   |  By Dr. Christine Izuakor
At the end of 2018, 30 million small businesses were operating in the United States, many of which relied on a variety of technologies to deliver their services. No matter how small in size or how new on the startup scene, these growing companies often face the same cyber risks that large and well-established companies face.
Aug 23, 2018   |  By Veriato
Since you’re reading this guide, it’s likely you recognize the threat insiders pose to an organization and the need to proactively build a plan to monitor, detect, and respond to potential and active threats. Insiders pose a real threat – 28% of data breaches are perpetrated by insiders, and institutional fraud is almost always an insider.
Jun 26, 2018   |  By Veriato
Organizations focused on security threats tend to focus on the external attacker. Solutions used to secure the perimeter, endpoints, email, and data are put in place. While absolutely necessary, they organizations lack the ability to equally protect against the insider – the employee that puts the organization at risk through either malicious intent or negligence.
May 30, 2018   |  By Veriato
Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you’ve “trusted” them as part of their employment, but when the time comes to change jobs, you can’t always be certain about the motive for the move.
May 11, 2018   |  By Veriato
The results of the SANS survey on insider threats show that organizations are starting to recognize the importance of protecting against the insider threat but struggle to deal with it; as one might expect, larger organizations are more likely to have provisions for responding to such threats.
May 10, 2018   |  By Veriato
The class of cyber actor with the greatest capacity to cause harm to organizations is not the so called state-sponsored hacker or cyber-terrorists. It is the “insider” – the company’s employees, ex-employees, and trusted vendors.
Dec 9, 2019   |  By Veriato
Veriato Vision employee monitoring software lets you record and track all of your employees' activity... so you’ll know if they are working hard or hardly working.
Nov 11, 2019   |  By Veriato
Too many organizations are still failing to prioritize mitigating the risk posed by Insiders, whether they're malicious actors or model employees who make mistakes that unintentionally lead to a data breach.
Oct 24, 2019   |  By Veriato
Data is currency online and on the dark web where social security numbers sell for $1 each, debit or credit card numbers as much as $110, and passports and medical records $1,000 or more. Without deep visibility into user activity within an organization, suspicious behaviors that signal fraud may go unnoticed and insiders can profit by selling your sensitive data.
Aug 27, 2019   |  By Veriato
Insider threats have become the Achilles' heel of most corporate security strategies that rely primarily on access management, network analysis or trying to lock down sensitive documents.
Aug 22, 2019   |  By Veriato
How criminals extort businesses using RansomWare services from the DarkWeb.