A preview of director Oliver Stone's upcoming film "Snowden" portrays former NSA contractor Edward Snowden as a gung-ho action hero - a cunning insider and a clever operative.
Security experts worldwide are sorting through the implications of the so-called "Panama Papers" leak, involving 11.5 million records. The documents highlight an elaborate web of offshore holdings that everyone from heads of state to celebrities and fraudsters have allegedly used to hide billions of dollars.
Although we have made progress in the use of analytics and intelligence, the latest
SANS Security Analytics survey shows 26 percent of respondents feel they still can't
understand and baseline normal behavior in their IT environments, with a majority citing
a lack of people and dedicated resources as an...
Today's advanced attacks focus more on exploiting human flaws than system flaws. In 2015, attackers shifted away from
automated exploits and instead engaged people to do the dirty work- infecting systems,
stealing credentials, and transferring funds. Across all vectors and in attacks of all sizes,
threat actors...
For years, financial services and other industries have experimented with first-generation user behavior analytics solutions. Now the security sector is starting to deploy second-generation solutions that have the promise of enhancing organizations' ability to spot and stop intrusions.
Register for this session to...
When it comes to threat detection, spotting malicious insiders is one thing. They often leave a trail. But how do you protect against the accidental insider threat? Organizations need to deploy tools such as spam filters, secure gateways and sandboxing technologies to help
mitigate the vulnerabilities introduced by...
Human beings are the weakest link within any organization, presenting new opportunities for cybercriminals to infiltrate your company. But your employees can also be your first and best line of defense. With a robust security education program in place, your company can protect its most sensitive information by...
In this in-depth audio report, a panel of experts addresses the challenge of detecting insider threats and outlines the latest approaches, including "sentiment and linguistic" systems.
Significant threats and massive breaches make front-page news on a regular basis, leaving businesses and consumers wondering whether their data could ever be considered safe again. Major vulnerabilities have been found lurking in well-known applications, many of which had been dormant for more than 10 years. Once...
Organizations in all sectors need to develop an "early warning system" to detect insider threats, says Scott Weber, managing director at the risk management firm Stroz Friedberg.
The former Morgan Stanley financial adviser who in September pleaded guilty to stealing confidential customer information and saving it on his home server will not serve time in prison, even though some of that data was posted online.
New details emerging about a breach involving a former Morgan Stanley employee illustrate how a case of inappropriate access to data can blossom into something much more serious. The case shines a spotlight on the urgent need to mitigate insider threats.
Files may be secure within a network using perimeter-based solutions. They may even remain secure during transit using encryption technologies. But what happens once recipients obtain and decrypt those files? How do you keep information secure as the file gets passed around or downloaded onto a flash drive? How can...
While cyberattacks will continue to menace healthcare and other business sectors next year, organizations can't afford to overlook addressing risks tied to insiders, who are responsible for most data breaches, says Michael Bruemmer of Experian Data Breach Resolution.
A recent survey asked information security decision-makers from various industries globally what keeps them up at night and insider threats were high on the list for the 345 pros polled. Protection from imposters requires rapid and reliable detection that offers immediate insight into what's happening, how it's...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.