During the webinar we will discuss how logging end-user activity will help you detect malicious activity, see the detail behind a possible threat and improve security measures that deter future threats. Topics will include:
Effective detection mechanisms that provide alerts to potential threats;
How to obtain...
Eight defendants have been charged in an alleged identity theft fraud scheme involving the theft of personal information from a call center for use in unauthorized wire transfers and to obtain payment cards.
Security experts are sizing up the challenges that would be involved in implementing a federal government proposal to continuously monitor employees and contractors with security clearances in hopes of preventing leaks of sensitive information.
Financial services firms enjoy a few advantages over organizations in other industries. Banks and investment firms tend to have larger IT/security budgets and highly experienced security staff members. Large metropolitan banks also have more lucrative salary structures, and so they also have the luxury of recruiting...
As large scale breaches become increasingly commonplace, organizations need to rethink breach prevention initiatives. Breaches can be initiated by malicious or even benign insiders, as well as from external threats who are able to acquire the credentials of trusted insiders.
This whitepaper explains how...
For years, researchers have studied malicious insider threats. But how can organizations protect themselves from insiders who make a mistake or are taken advantage of in a way that puts the organization at risk?
The average insider scheme lasts 32 months before it's detected, says threat researcher Jason Clark, who suggests using a combination of the right technologies and the right processes is the key to improving detection.
Randy Trzeciak and his CERT Insider Threat Center colleagues are working to broaden the definition of the insider threat to incorporate not just the risk to information and IT but to facilities and people, too.
Maintaining accurate logs of systems' activities is crucial in helping catch insiders who threaten an organization's digital assets, says George Silowash, co-author of the Common Sense Guide to Mitigating Insider Threats.