This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The Great Resignation opens the door to higher levels of insider threats, with ex-employees accidentally bringing enterprise data with them into new roles or intentionally introducing malware into a former employer's system. Here's how organizations can protect themselves from insider risk.
An Internet Society report finds that most organizations do not comply with existing global privacy regulations and are not ready for additional regulations that are going into effect in 2020.
Research finds major challenges monitoring and managing privileged user access and activities, with 70 percent of respondents indicating users likely to access sensitive or confidential data without a business need.
China’s National Computer Network Emergency Response Technical Team (CN-CERT) says in its first-half report for 2019 that apps request an average of 25 permissions when installed, which is concerning as data theft remains a widespread issue.
Thirty-two percent of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and employees.
What is an insider threat? Security professionals know that insider threats, by their nature, are a broad-based threat and, more than ever before, can be extremely difficult to defend against. In this article, we will briefly discuss the possible risks, as well as some options for building up your defenses.