A recent survey asked information security decision-makers from various industries globally what keeps them up at night and insider threats were high on the list for the 345 pros polled. Protection from imposters requires rapid and reliable detection that offers immediate insight into what's happening, how it's...
This White Paper will present some common sense suggestions for improving the "beginning of the lifecycle" risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we'll look at how to tie the efforts made at the beginning of the lifecycle to...
Insider data exfiltration causes tremendous damage every year. Worse, the vast majority of insider data exfiltration goes undetected simply because the organization is not looking for it. Relying on technologies designed primarily to secure the perimeter leaves much to be desired. Relying on trust is only an option...
In this first video of a four-part series, Chris Inglis, former deputy director at the NSA and current Chairman of the Securonix advisory board, sits down with Securonix CEO Sachin Nayyar for a candid conversation about cyber security strategy. How is the threat landscape changing? And how should companies defend...
In this second video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, joins Securonix CEO Sachin Nayyar to discuss the evolution of technological capabilities to defend organizations against increasingly complex cyber attacks.
In this third video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, sits down with Securonix CEO Sachin Nayyar to discuss today's insider threats.
In this final video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, joins Securonix CEO Sachin Nayyar to discuss the role of Government in the ongoing cyberwar.
Most cyber security incidents are not particularly technical and in fact, the majority of data breaches are the result of simple human error. A major recent study of cyber-attack and incident data reported that 95 percent of all security incidents predominantly exploit the weakest link, the human. Internal and...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misperception allows one of the biggest threats to your organization's data to stay completely under the radar -...
Despite the focus on external cyberattacks, insider attacks are almost as common and can potentially cause significantly more damage, says Michael Theis of Carnegie Mellon's CERT Insider Threat Center. In a video interview, he describes how science-based models can help organizations fight the battle from within.
Do you know the most common risk factor for corporate cybercrime? Employees. Sometimes, the threat actually originates from within, when employees' ignorance and/or negligence opens the door for cybercriminals.
This eBook is designed to provide you with tips for educating your employees
about cybersecurity. It's...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misperception allows one of the biggest threats to your organization's data to stay completely under the radar -...
Prosecutors recommended that twin brothers Muneeb and Sohaib Akhter serve a six-year and a two-year sentence, respectively, after pleading guilty to hacking-related charges. But one of the men received a much lighter sentence.
Significant threats and massive breaches make front-page news on a regular basis, leaving businesses and consumers wondering whether their data can ever be considered safe again.
That kind of news can be especially damaging to the financial services industry, where success really depends on reputation and trust....
A penny saved is a penny earned, as Benjamin Franklin made familiar in Poor Richard's Almanac in 1737 - and every penny of fraud loss recovered (or better yet, avoided) goes straight to the organization's bottom line.
Present-day examples span the gamut of industries. The losses are in the billions and growing -...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.