Insider Threats

tripwire

Escaping the Egregious Eleven - Part One

Helping to define and examine the top perceived cloud security threats of the day, the ‘Egregious Eleven’ is the most recent iteration in an evolving set of summary reports published by the Cloud Security Alliance (CSA). It follows on from the ‘Treacherous Twelve,’ which they defined for us in 2016, and the ‘Notorious Nine,’ which they presented in 2013.

Fraud Prevention with User Behavior Analytics

Data is currency online and on the dark web where social security numbers sell for $1 each, debit or credit card numbers as much as $110, and passports and medical records $1,000 or more. Without deep visibility into user activity within an organization, suspicious behaviors that signal fraud may go unnoticed and insiders can profit by selling your sensitive data.
veriato

Cybersecurity Trends in Agriculture

The agriculture sector is a staple of critical global infrastructure. We need food to survive as human beings, and a loss of access to these assets could be physically and emotionally detrimental to hundreds of millions of people. The sector is made up of numerous organizations that support critical functions such as growing crops, raising animals, and harvesting fish and other animals from a farm, ranch, or their natural habitats.

veriato

Cybersecurity 101 For Entrepreneurs And Start-Ups

At the end of 2018, 30 million small businesses were operating in the United States, many of which relied on a variety of technologies to deliver their services. No matter how small in size or how new on the startup scene, these growing companies often face the same cyber risks that large and well-established companies face.

veriato

Disturbing Cybersecurity Trends In Aviation

Aviation is a component of critical infrastructure that is comprised of a complex web of public and private organizations relying on millions of assets to move people and cargo around the world. The industry supports countless critical functions such as emergency response, community access, agricultural support, passenger services, national security, law enforcement, border security, intermodal connections to rail and shipping, and much more.

veriato

Five Ways Cyber-Attackers Are Using AI to Their Advantage

Industries far and wide are raving about all of the ways that artificial intelligence can help transform the world into a more efficient and productive environment. Within cybersecurity, AI is already leaving a lasting impact. Today it is already being used to alleviate the industry's talent shortage by automating processes, increase the accuracy of alerts, minimize false positives in technology, cut down investigation times during incidents, eliminate the need for passwords, and more!

veriato

To AI or Not to AI - Five Challenges Companies Face When Attempting to Embrace AI

Artificial intelligence is one of the biggest buzzwords of the year. It seems to be a much-needed answer to many woes across various industries and inherent challenges. While many are embracing the concept, others remain skeptical about the true benefit that artificial intelligence can have in businesses. No matter what side of the fence a company is on, there are some considerations to keep in mind and common mistakes to be mindful of as you embark on your AI journey.

veriato

When Employees Waste Time, and What to Do About It

The numbers are shocking. According to the 2019 The State of Work Report, employees spend just 40% of their workday on primary tasks. A Gallup poll showed that disengaged employees cost companies in the United States between $450 and $550 billion per year, and highly engaged teams are 21% more profitable than others. So how can an organization find out what employees are doing when they are on the clock so they can take steps to increase engagement and boost productivity?