A Kansas man faces federal charges for allegedly accessing the network of a local water treatment facility and tampering with the systems that control the cleaning and disinfecting procedures, according to the Justice Department. The charges follow a similar security incident at a Florida facility.
Four editors at Information Security Media Group review the latest cybersecurity issues, including Microsoft Exchange server hacks, insider threat management and implementing a "collective defense."
The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks.
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. Since insiders are...
Insider threat programs can help significantly reduce the chance of system compromise or breach. This can help organizations save substantial amounts of money and avoid loss of brand reputation and customer trust.
Download this guide to learn how to build your insider threat program with tips like determining...
While an external attacker trying to gain access to the network might raise a number of flags, someone internally who steals information might not raise any suspicion at all. This leaves organizations vulnerable to insider threats.
Download this guide to learn about three tools and methods that can help you detect...
As the workforce trends toward remote work, insider threats remain one of the top causes of security breaches.
Faster detection and response to insider threats helps avoid a major data breach that would put your organization at risk of making news headlines.
Keep your corporate data secure by adapting to new...
Insider threats refer to security risks caused by malicious users within a corporate network. While the term is most commonly used to describe illicit or malicious activity, it can also refer to users who unintentionally cause harm to the business. In the case of a malicious insider, the user typically is acting with...
Recent research highlights the growth in risky remote work behaviors. Dr. Margaret Cunningham of Forcepoint X-Lab discusses the implications of this increase in insider threats and shares risk mitigation strategies.
Insider Threats are a growing problem for organizations. According to a recent analyst report, about 50-70% of all security incidents are attributed to insider activity. For many organizations, detecting insider threats is difficult because the threat actor is using a trusted identity and has legitimate access to its...
Insider Threats are a growing problem for organizations. According to a recent analyst report, about 50-70% of all security incidents are attributed to insider activity. For many organizations, detecting insider threats is difficult because the threat actor is using a trusted identity and has legitimate access to its...
A Russian national who conspired to extort millions from electric car manufacturer Tesla by trying to plant malware in the company's network has pleaded guilty to a single federal conspiracy charge, according to the U.S. Justice Department. The FBI thwarted the plot before it could be carried out.
Insider risks are one of the top concerns of security and compliance professionals, and industry studies have shown that insider risks are often associated with specific user events or activities. Protecting your organization against these risks can be challenging to identify and difficult to mitigate. Insider risks...
To assist organizations with making actionable decisions on the adoption of contextually-aware platforms, Enterprise Management Associates (EMA) conducted primary, survey-based research on the current requirements, use, and outcomes of utilizing contextually-aware identity and access management (IAM) solutions.
The...
The U.S. Marine Corps looks to expand its insider threat program and seeks proposals to include activity monitoring technology on its enterprise and classified networks. The goal is to give the Marines greater ability to monitor network traffic and stop insiders from exposing data.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.