Organizations in all sectors struggle with mitigating the insider threat, but it's an acute concern in healthcare, where patients' lives are at stake. Pete Nourse of Veriato outlines specific threats to this sector.
Education plays a critical role in any program designed to combat insider threats, says Christopher Greany, head of group investigations at Barclays. He'll discuss how to start an insider threat program in a presentation at Information Security Media Group's Security Summit: London, to be held Oct. 23.
The EU's General Data Protection Regulation, which has tough breach notification requirements, is spurring global interest in technologies to help prevent insider breaches, says Tony Pepper of Egress Software Technologies.
Randy Trzeciak, director of the CERT Insider Threat Center at CMU, says he's frequently asked: "Haven't we solved the insider threat problem?" Far from it, he responds. In fact, he's helping many organizations start insider threat defense programs. He'll be a speaker at ISMG's New York Security Summit.
An Equifax software engineer has settled an insider trading charge with the U.S. Securities and Exchange Commission after he allegedly earned $77,000 after he made a securities transaction based on his suspicion that the credit bureau had suffered a data breach.
From open banking to emerging technology and the evolving needs of a new generation of on-the-go customers, financial institutions are experiencing unprecedented change. This means the use of advanced technology is on the rise as every institution searches for the next big thing to maintain a competitive edge.
This case study illustrates how Digital Shadows helped the head of threat intelligence at a bank discover a user on the dark web claiming to be a bank employee selling access to high net worth individual's accounts. The fact that the seller appeared to be an employee, this threat was of heightened priority to this...
When insider threat researcher Randy Trzeciak looks at artificial intelligence and machine learning, he sees the potential for technology to help organizations predict potentially dangerous insider behavior - not just respond to it.
If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.
The Securities and Exchange Commission and the Department of Justice have both charged Jun Ying, a former CIO at data broker Equifax, with engaging in illegal insider trading after he determined that his employer had suffered a massive breach.
On average, 49 per cent of users admit to having shared their network password with at least one other user.
So, as employee numbers grow, an organisation's vulnerability to insider threats increase dramatically. This can cause long term damage, taking months or even longer to protect.
This report explores the...
Now that it's been confirmed that an insider at Punjab National Bank paved the way for $1.8 billion in fraudulent transactions, RBI, the nation's central bank, is reiterating the need to strengthen security measures tied to SWIFT interbank transactions, and security experts are offering risk mitigation advice.
Authentication innovation is still in its infancy, and most companies are still combining more traditional passwords and PINs with cutting edge
biometrics or contextual decisioning methods. The combination brings new capabilities to multi-factor authentication, but doesn't necessarily produce the best possible...