This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
ThycoticCentrify announced new research that reveals more than half of organizations have been grappling with the theft of legitimate, privileged credentials (53%) and insider threat attacks (52%) in the last 12 months. In 85% of the privileged credential theft instances, cybercriminals were able to access critical systems and/or data. In addition, two-thirds (66%) of insider threats led to abuse of administrative privileges to illegitimately access critical systems and/or data.
On June 22, 2021 at 1 pm Eastern, Former Assistant Director, FBI Counterintelligence as well as corporate security executive Frank Figliuzzi, will spend 60 minutes talking about protecting the corporate brand and reputation in the digital age.
With technology becoming more accessible and complex, prioritizing a defense against insider threats may be the better strategy. After all, the moment an outsider breaches an organization, they become an insider.
We have all been served by a surly retailer whose made us feel that their job and life would be easier, if it weren’t for the customers. Alas, sometimes it feels the same applies in cybersecurity. Life would be so much better, if not for those pesky employees.
With enterprise security risk management, organizations should consider the risks versus potential impact to dictate when and how often they assess risk. What does that mean for your organization?
Enterprise security risk management is an approach where organizations should consider the risks versus potential impact in order to dictate when and how often they assess risk. The ESRM approach to risk management and security is meant to keep a security program agile and responsive. Learn about the keys needed to implement an efficient ESRM program.
ADM and its security team tapped into existing data, both inside the company and publicly available, to enable informed decision-making and real-time insight into the company’s pandemic response plan including contact tracing, location insight and information, and facility occupancy.
ADM and its security team, including Kevin Wujek, Insider Threat Coordinator, tapped into existing data, both inside the company and publicly available, to enable informed decision-making and real-time insight into the company’s COVID-19 pandemic response plan including contact tracing, location insight and information, and facility occupancy.
Steven Seiden, president of Acquired Data Solutions (ADS), has been involved in “digital divide issues” for more than 20 years, and he believes broadening inclusion and diversity in the STEM literacy field is one of his purposes. An engineer by trade, Seiden has experienced a shift in the tech world over the years, watching the convergence of technology, IT and IOT and noting the ever-expanding engineering lifecycle that now includes security.
Human error contributes to almost 95% of security breaches. Most security approaches still fail at making a desired impact. Let’s analyze the two main reasons why businesses fail to develop a robust, human-centric security approach.
Changeover is inevitable at every organization, all the way up to the chief executive, but former employees with a motive can abuse their privileges to access information they deem valuable or useful in the future, causing irreparable harm to the enterprise and its operations. This insider threat is preventable. Find out how.