Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Should you be worried about false negative insider threats?

The consistent rise in Insider Threat-related incidents has led to a growing focus and investment in proactively detecting these threats. According to reports, 60% of organizations discovered one or more insider attacks last year, and 90% admitted that they felt vulnerable to insider attacks. Reports also show that it takes an average of over two months to contain an insider attack.

Forensic Software - Getting the Proof You Need

Employees are both the biggest asset of a company and also the biggest risk factor. Forensic software is designed to provide visibility when malicious or incompetent employee behavior is suspected that could present a threat to the company. Trying to gather proof of these issues manually is both time consuming and high risk. If you tip off the staff member, they can cover the tracks, and you may never know what was done.

Remote Employee Monitoring: How to Make Remote Work Effective and Secure

Cybersecurity specialists treat remote employees as a threat, and they’re right to do so. However, remote work isn’t a temporary trend — it’s here to stay. Between 2017 and 2018, 36 million (or 25%) of US employees sometimes worked at home according to the US Bureau of Labor Statistics. For lots of specialists, the ability to work outside the office is an important benefit when choosing an employer.

Monitoring a Mobile Workforce

With recent worldwide epidemic scares, many companies are asking their employees to work from home as much as possible. Statistics show that even without an imminent threat from illnesses like the coronavirus, companies would do well to prepare for the ever-increasing proportion of employees who work remotely. According to an analysis by Flexjobs and Global Workplace Analytics, there has been a significant upward trend in the number of people who now work remotely in the United States.

Our award-winning IAM and insider threat prevention solutions highlighted at RSA Conference 2020

ManageEngine brought home its first set of accolades for 2020: two InfoSec Awards presented by Cyber Defense Magazine at RSA Conference 2020. Amidst the over 3,000 cyberdefense innovators that were assessed by Cyber Defense Magazine for its 2020 InfoSec Awards, ManageEngine was recognized for its identity and access management (IAM) offering, AD360, and for its insider threat prevention in Log360.

How to record, log and audit any Microsoft Hyper-V, VMware Horizon, and Citrix session with EKRAN

Ekran System® can help you to organize virtual desktop monitoring and user session recording in environments like VMware Horizon, Microsoft Hyper-V, or Citrix. In addition to Citrix session recording, Ekran System delivers a comprehensive set of identity and access management features, real-time alerting, and incident response tool sets.

Workforce Management Software

Workforce management, often shortened to simply WFM, is about managing staff schedules and services within companies. Workforce management software incorporates most software that focuses on managing and simplifying the process of scheduling staff work hours as well as managing their work and productivity. Managing large amounts of staff members turns into a massive task for human resources teams if they have to do everything manually.

Reducing Cyber Risk With AI and User Behavior Analytics

At the end of 2019, Security Intelligence released a report on trends that should influence your security planning for 2020. Near the top of the list was the need for visibility, alignment, and analytics when it comes to cybersecurity. Leaders are coming to terms with the idea that being able to see, understand, and have reliable records of what users are doing with their corporate assets can provide valuable insights when trying to reduce cybersecurity risks within your organization.

Cyber Security Trends in the Energy Sector

Each day, we depend on energy for almost every kind of activity imaginable. Energy is required to keep lights on, enable transportation around the world, allow hospitals to operate, power the internet, and much more. Also termed the Oil and Gas sector, it’s considered a critical infrastructure sector by most nations around the world. This is because a loss of energy can cause a debilitating impact on the quality of human life.