Honeypots were the first form of deception technology. IT security researchers started using them in the 1990s, with the intent to deceive malicious actors who had made it onto the network into interacting with a false system. In this way, honeypots could gather and assess the behavior of the malicious actors. They were not created for threat detection. However, things have changed a great deal in the years since honeypots were created – including deception technology.
The Florida Department of Education (FDOE), in coordination with the Florida Department of Law Enforcement, announced an integrated data repository and data analytic resource to improve school threat assessment teams’ access to timely information from a variety of data sources to identify, assess and provide intervention services.
A majority of organizations continue to struggle with insider threat detection and management – largely due to outdated systems, immature programs, and insufficient investments.
The 2018 State of Cybersecurity in Small and Medium Size Businesses study, conducted by the Ponemon Institute, sponsored by Keeper Security, revealed that small businesses increasingly face the same cybersecurity risks as larger companies, but only 28 percent rate their ability to mitigate threats, vulnerabilities and attacks as “highly effective.”
A new research study, Cybersecurity: Perceptions & Practices, found that less than half of all organizations were able to detect a major cybersecurity incident within one hour. Even more concerning, less than one-third said that even if they detected a major incident, they would be unable to contain it within an hour.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime.