Stephanie Jaros, Director of Research for the U.S. Department of Defense’s (DoD) counter-insider threat program, talks to Security about the integration of the human and behavioral sciences into insider threat mitigation, as well as the criticality of the timeline when it comes to addressing such risks.
Reducing our threat surface by limiting what any one person can access and improving organizational efficiency processes can go a long way in mitigating damage from the vast majority of attacks — no matter if they come from inside or outside your organization.
This insurance giant’s physical security team is focused on being a business enabler for the company. With communication and integration between the business’ physical and cybersecurity sides, the company and its security teams are well-positioned to manage risk and insider threats while maintaining business continuity together.
Welcome to The 2021 Security Benchmark Report, which includes comparisons of all security organizations, sector reports, annual top trends and leadership profiles.
Welcome to The 2021 Security Benchmark Report. This issue marks a new approach and name to the report, focusing on metrics and data that security organizations can use to measure their security organizations against their peers.
New research released by CyberArk reveals that organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats and credential theft.
Water and wastewater (WWS) facilities are under attack, along with the recent increase in critical infrastructure cyberattacks. A joint statement from the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Agency (CISA), the Environmental Protection Agency (EPA) and the National Security Agency (NSA) details recent attacks and what WWS systems can do to bolster their cyber defense.
The second Voice of SecOps report from Deep Instinct revealed that the average time elapsed before a company responded to a cyberattack was 20.9 hours globally. The report surveyed 1,500 cybersecurity professionals about their top cyber concerns.
The Cybersecurity and Infrastructure Security Agency (CISA) has identified several potential risks of autonomous vehicles in transit systems and supply chains. Along with these risks, CISA has introduced a set of guidelines for organizations who use autonomous vehicles in their operations.
The Cybersecurity and Infrastructure Security Agency released an Insider Risk Mitigation Self-Assessment Tool, which assists public and private sector organizations in assessing their vulnerability to an insider threat.
A new report, The State of Insider Threats 2021: Behavioral Awareness & Visibility Remains Elusive, revealed that organizations struggle to identify the indicators of insider attacks.