Veriato

Sep 2, 2018
1998
Palm Beach Gardens, FL, USA
Jan 7, 2019   |  By Veriato
Typically, people think of security threats as outside attacks on an organization. Data security plans tend to focus on securing the perimeter, endpoints, email and data. Though these are certainly critical measures, all organizations should realize the real threat that insiders, or internal employees, pose to operations.
Dec 31, 2018   |  By Veriato
Workplace investigations can be extremely tense and have high stakes. While every investigation will look a little different based on the nature of the company, HR team and incident, it’s important to have a clearly defined plan for investigating reports filed by employees. Here’s a step-by-step guide to conducting a timely, impartial and thorough workplace investigation.
Dec 24, 2018   |  By Veriato
We all know the perks of allowing employees to work remotely. From lower overhead (less snacks and drinks to provide) to increased productivity and job satisfaction, working from home is becoming more and more common in today’s business landscape. Unfortunately, with this system comes many data security risks to consider. With so many devices being used for work and various network connections to monitor, how can you allow your employees to work remotely and still maintain data security?
Dec 17, 2018   |  By Veriato
Everything you need to know about endpoint network security and how to conduct an endpoint security audit.
Dec 10, 2018   |  By Veriato
As 2019 approaches, it’s a great time to look ahead at your information security plan and see what is being prioritized in your budget. 2018 saw an increased interest in investing in external security audits and improved endpoint protection. Here are a few cyber security trends to adopt in 2019 that will keep your organization’s information as safe as possible.
Aug 23, 2018   |  By Veriato
Since you’re reading this guide, it’s likely you recognize the threat insiders pose to an organization and the need to proactively build a plan to monitor, detect, and respond to potential and active threats. Insiders pose a real threat – 28% of data breaches are perpetrated by insiders, and institutional fraud is almost always an insider.
Jun 26, 2018   |  By Veriato
Organizations focused on security threats tend to focus on the external attacker. Solutions used to secure the perimeter, endpoints, email, and data are put in place. While absolutely necessary, they organizations lack the ability to equally protect against the insider – the employee that puts the organization at risk through either malicious intent or negligence.
May 30, 2018   |  By Veriato
Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you’ve “trusted” them as part of their employment, but when the time comes to change jobs, you can’t always be certain about the motive for the move.
May 11, 2018   |  By Veriato
The results of the SANS survey on insider threats show that organizations are starting to recognize the importance of protecting against the insider threat but struggle to deal with it; as one might expect, larger organizations are more likely to have provisions for responding to such threats.
May 10, 2018   |  By Veriato
The class of cyber actor with the greatest capacity to cause harm to organizations is not the so called state-sponsored hacker or cyber-terrorists. It is the “insider” – the company’s employees, ex-employees, and trusted vendors.
Dec 7, 2018   |  By Veriato
Veriato's Pete Nourse on Why This Is the Sector's Achilles Heel.
Nov 30, 2018   |  By Veriato
The Veriato Insider Threat Program Maturity Model report was created to help security professionals assess their ability to monitor, detect, and respond to insider threats. Join Insider Threat expert, Jim Henderson from Insider Threat Defense, Nick Cavalancia from Techvangelism and Cyber Security Expert, Patrick Knight as they discuss numerous results from the Insider Threat Maturity Report.
Aug 16, 2018   |  By Veriato
Many companies today are allowing employees to work remotely. With new communication technologies, remote employees are fully enabled to get their job done, no matter where they are. But how do we monitor remote employees?
Jul 13, 2018   |  By Veriato
Developing and executing an Insider Threat Program that aligns with corporate values and data sources, brings about some unique challenges and concerns. Join Insider Threat expert, Jim Henderson from the Insider Threat Management Group and Nick Cavalancia from Techvangelism as they discuss.
May 30, 2018   |  By Veriato
The greatest challenge in identifying a threat is knowing what actions to be watching and which of them constitute a potential threat. With benign and threatening insider activity looking so similar, it’s no wonder it takes months to identify data breaches or fraud.