Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Employee Monitoring & Insider Threat Detection in a Post COVID World

In our post-COVID, work from home world, employee monitoring and Insider Threat Protection have never been more important or in-demand. These essential tools ensure employee productivity while protecting sensitive data and industry compliance. Join us for a free webinar on 18th October at 15.30 IST, brought to you by Veriato, the leader in activity monitoring and insider risk solutions for the work from anywhere world.

How to Secure Intellectual Property in Manufacturing: 9 Best Practices

Intellectual property (IP) is crucial for manufacturing organizations to compete in the market. At the same time, IP may be a target for dishonest competitors, former employees, and cybercriminals. That's why it's vital to take all possible measures to protect the security of intellectual property in the manufacturing sector.

The Myths and Truths of Employee Monitoring

Early in the pandemic, searches related to “how to monitor employees working from home” increased by 1,705%. Without the oversight of managers in an office setting, many companies are concerned that their employees are less productive, and that there is an increase risk to the company. This is a major reason why the use of employee monitoring technology has soared in the past year.

7 Key Measures of an Insider Threat Program for the Manufacturing Industry

The increasing digitalization and interconnectivity of the manufacturing industry has fundamentally changed how this sector operates. With automation, remote diagnostics, and connections to the internet, manufacturers have faced a growing number of cybersecurity challenges, including insider risks.

How analyzing employee behavior can improve your cybersecurity posture

Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology manifests within most of our minds. Organizations often neglect human behavior's impact on their cybersecurity postures. Instead, they spend lavishly on endpoint security tools, threat hunting programs, and building incident response plans. Admittedly, these security measures are a crucial part of mitigating attacks.

Top Tips in Honor of National Insider Threat Awareness Month

As National Insider Threat Awareness Month draws to a close, Egnyte is taking this opportunity to reinforce everyday best practices that companies like yours need to follow. The goal of the month is to educate U.S. government and industry leaders about the risks of insider threats and how to effectively address them.

Insiders cause 20% of data breaches

Apart from external attackers, organizations need to consider another type of threat when planning their cybersecurity strategy: insider threats. There are different types of insiders. On the one hand, there are people who have secret knowledge and unintentionally create risk openings within an organization; and on the other, there are others who intend to cause harm, motivated by profit, extortion, or personal grievance. This means insiders can be classified as follows.

Automating insider threat monitoring

From ingestion of relevant data sources to automation around threat monitoring, the security engineering team at Netskope utilizes Sumo Logic as a key tool in the protection of their intellectual property. Join this session to learn how something that began as an idea for an easy-to-use dashboards developed into a near completely automated process for data collection and correlation for investigating suspicious activity.

Overheard at the SANS Security Awareness Summit 2022

People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals are concerned about are phishing, business email compromise (BEC) and ransomware, all closely related to human behavior.

Responding to Change: How to Improve Your Organization's Cybersecurity

The world is changing rapidly, with organizations facing new cybersecurity challenges all the time, forcing them to continuously update their cybersecurity strategies. This is especially relevant when it comes to events that have a global effect, like the COVID-19 pandemic and Russia's invasion of Ukraine.