Posts by Richard Henderson

Richard Henderson
Richard Henderson is global security strategist at Absolute Software where he is responsible for spotting trends, watching industries and creating ideas. He has nearly two decades of experience and involvement in the global hacker community. He is a researcher and regular presenter at conferences, and skilled electronics hacker. He was one of the first researchers in the world to defeat Apple's TouchID fingerprint sensor on the iPhone 5S. Richard was a technical editor of a book on IoT Security: RIoT Control: Understanding and Managing Risks and the Internet of Things. He is currently co-authoring the second edition of Cybersecurity for Industrial Control Systems.
5 Ways to Improve Insider Threat Prevention
Richard Henderson
5 Ways to Improve Insider Threat Prevention

If you browsed the latest security headlines, you’d probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity. While we recently examined the rising of the politically motivated insider, the truth is that most incidents are traced back to employees...

READ MORE
Political Activists: A Powerful Insider Threat
Richard Henderson
Political Activists: A Powerful Insider Threat

A single person inside your organization holds the power to disrupt and cause costly damage. Up to 43% of all breaches are the result of insiders either inadvertently or maliciously putting data at risk, but it’s these privileged insiders that hold the necessary credentials and access to cause significant reputational damage. By far, the most nefarious of these insiders is the malicious insider with a strong moral, religious or political...

READ MORE
Do You Have a Dark Endpoint Problem?
Richard Henderson
Do You Have a Dark Endpoint Problem?

Endpoint blind spots are large – and growing. According to the recent Cost of Insecure Endpoints study by Ponemon, 53% reported malware infected endpoints had increased in volume in the past 12 months alone and 63% said they could not monitor company endpoints once they left the corporate network. More attacks and less visibility is a recipe for disaster of course: it puts your data at great risk and...

READ MORE
Stopping KRACK Attacks Starts with Visibility
Richard Henderson
Stopping KRACK Attacks Starts with Visibility

KRACK attacks hit the headlines last week and the news was bad for anyone who uses Wi-Fi. (Or in other words, everyone.) KRACK or Key Reinstallation Attack is a security flaw in the WPA2 protocol that allows an attacker to break encryption between a router and any device and interrupt network traffic as a user connects. The attacker isn’t actually on your network, rather they are listening in as...

READ MORE
The Evolution of Insider Threats
Richard Henderson
The Evolution of Insider Threats

October is National Cyber Security Awareness Month, a global campaign run annually to raise awareness about the importance of cybersecurity. We’ve asked some of our leading security experts here at Absolute to chime in on some of the most pressing issues in cybersecurity today. In the fourth and final part of this series, we bring you a glimpse of what the future looks like for one of today’s most...

READ MORE