Download this eBook to find out how to start tackling an insider risk management problem. In this eBook, insider threat expert and CEO Shawn M. Thompson, Esq. draws on the Insider Threat Management Group's experience training and building insider threat programs for over 500 companies, to:
Explore insider threat...
Verizon's 2020 Data Breach Investigations Report (DBIR) reveals that, across all industries, "inside actors" are responsible for nearly 1/3 of data breaches -- and the number is even higher in some industries. Join cybersecurity experts from Verizon for a look at how insiders can accidentally (or intentionally) cause...
Following Twitter's admission that cryptocurrency scammers socially engineered its employees to gain control of 45 high-profile accounts, one reaction has been: Why didn't anyone crack Twitter sooner? Unfortunately, the answer is that they have, especially if you count nation-states bribing insiders.
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
As companies lay off employees and deal with financial challenges during the COVID-19 pandemic, they're also facing an increase in the number of insider fraud incidents, says Randy Trzeciak, director of the National Insider Threat Center at Carnegie Mellon University, who offers fraud detection tips.
As organizations across the globe face the prospect of remote working for the long run, insider attacks are quickly becoming one of the most common - and most dangerous - threats to security teams of all sizes.
Join David Masson, Darktrace's Director of Enterprise Security, as he discusses how Cyber AI is uniquely...
The latest edition of the ISMG Security Report analyzes the surge in the use of employee monitoring tools for the increasingly remote workforce. Also featured: Discussions about IoT security guidelines and CCPA compliance requirements.
With so many employees working from home during the COVID-19 pandemic, vendors of time-tracking and productivity-monitoring software report surging interest in their wares. Regardless of whether organizations deploy light-touch or more Big Brother types of approaches, beware potential privacy repercussions.
The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.
The primary goal when breaking the build in the CI/CD DevOps life cycle is to treat security issues with the same level of importance as quality and business requirements. If quality or security tests fail, the continuous integration server breaks the build.
When the build breaks, the CI/CD pipeline also breaks....
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
An internal CIA report from 2017 - just released in heavily redacted form - found that the agency's failure to secure its own systems facilitated the massive "Vault 7" data breach that enabled classified information, including details of 35 CIA hacking tools, to be leaked to WikiLeaks.
In the aftermath of the COVID-19 pandemic, the abruptness and unprecedented scale at which organizations have advised employees to work remotely, has given rise to complex and widespread IT security challenges; bringing into sharp focus the lack of preparation to meet such contingencies, and the pervasive...
A former IT administrator for an Atlanta-based building products distribution company has been sentenced to 18 months in federal prison after he sabotaged the firm by changing router passwords and damaging a critical command server. Overall, Charles E. Taylor caused more than $800,000 in damages.