Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

How Mature Is Your Insider Threat Program

The Veriato Insider Threat Program Maturity Model report was created to help security professionals assess their ability to monitor, detect, and respond to insider threats. Join Insider Threat expert, Jim Henderson from Insider Threat Defense, Nick Cavalancia from Techvangelism and Cyber Security Expert, Patrick Knight as they discuss numerous results from the Insider Threat Maturity Report.

7 Steps to Building an Insider Threat Program

Since you're reading this guide, it's likely you recognize the threat insiders pose to an organization and the need to proactively build a plan to monitor, detect, and respond to potential and active threats. Insiders pose a real threat - 28% of data breaches are perpetrated by insiders, and institutional fraud is almost always an insider.

How Employee Monitoring Keeps Clinical Trial Data Secure

Clinical trials are a crucial step in developing new life sciences products such as drugs and medical devices. All tests – whether with large or small groups of people – require medical and personal information from patients upfront, and then proceed to collect data throughout the process. Ultimately, research companies are responsible for large sets of sensitive data and securing that information should be a top priority.

Threats from within

Cyber security is a big deal these days. A very big deal. A deal worth £3.5billion to be precise. The threats are varied and numerous, with attackers constantly shifting their methods and approach to circumvent security. No matter how good cyber security gets and how thorough your processes are, the threat will always remain. What’s interesting here is that a large portion of this threat comes from within your own walls.

7 Questions for Evaluating your Security Posture against Insider Threats

Insider threats top the list of the most dangerous cyber risks for organizations worldwide. It doesn’t take much effort for insiders to steal your sensitive data, while such activities are hard to discover and impossible to prevent. Unfortunately, lack of visibility into user behavior is one of the key reasons why companies suffer from data breaches that involve either human negligence or malicious intent.