Insider Threats

Invest in your Security Culture
Arieanna Schweber
Invest in your Security Culture

Although the risk landscape facing organizations is always changing, the insider threat consistently remains the top source of data breaches. The insider threat is there to amplify any threat: cyberattacks, BYOD, cloud, IoT. Every new threat is made worse by people. So, how do you address the Insider Threat? The top of every list now is the recognition that the solution to the Insider Threat does not come in...

READ MORE
Arieanna Schweber
New Approaches Needed to Address Cloud Security

The shift to the cloud has significantly increased the risks to data security, although the cloud itself is not necessarily to blame. As has been demonstrated, many cloud purchases are made outside the control or oversight of IT, creating a dangerous Shadow IT environment that, when left unmanaged, places corporate data at risk. At the same time, organizations have struggled to adapt their security technologies, with legacy security tools...

READ MORE
Geoff Glave
Webinar: Remembering the User in your Layered Security Model

Security professionals have been proselytizing the benefits of layered security or defense-in-depth for a long time. The more layers you build in your security model, the more likely it will be that one (or some) of your defenses will detect anomalous or malicious behavior before it does any real significant damage to your network or infrastructure. Enterprises around the world are constantly being pitched with the latest and greatest...

READ MORE
Executive Endpoints Are Increasingly At Risk
Absolute
Executive Endpoints Are Increasingly At Risk

The data on employee endpoints—like laptops, mobile phones, and tablets—is at risk. While theft due to malware is a perennial risk, endpoint data is also at risk of theft through email, cloud storage, and device theft.

READ MORE