Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Establish an Insider Risk Security Team

The new era of remote work launched by COVID has given millions of employees the ability to work on their own terms and spend more time with their families. Unfortunately, remote work also comes with certain security risks, as organizations now need to guard against increased exposure to cybersecurity concerns with little physical oversight. But embracing remote work does not need to mean handing employees’ laptops with sensitive company information and hoping all goes well.

3 Tips for Mitigating the Insider Threat Facing Government Organizations

Verizon’s Data Breach Investigation Report for 2022 (DBIR) was recently released and it has some good news and it has some bad news when it comes to the risk of insider attacks. First the good news, sort of. According to the DBIR, the vast majority of breaches continue to come from external actors (80% vs 18% of insiders). Hopefully we can be a little less suspicious of Bob who sits two offices down from you. However when an insider attack happens, it can be really, really destructive.

How to Protect Intellectual Property: 6+ Tips for Businesses

Data theft is a very real problem that costs businesses an average of $4.24 million annually. But it’s not just customer data that’s vulnerable, your business’s intellectual property (IP) has a hefty price tag attached to it, too. In this article, you’ll learn the definition of intellectual property, its value in business, and ways to keep it protected. Table of Contents.

Two-Factor Authentication, App Productivity & Admin Logs (v7.0.1)

CurrentWare version 7.0.1 is here! With this release we’re excited to announce the introduction of two key security features: Two-factor authentication (2FA) and our first two admin activity logs! These enhancements provide an extra layer of security to help ensure that only trusted operators are accessing your admin console while providing greater visibility into what they are doing within the CurrentWare Suite.

How to Stop Insider Threats With UEBA

As the digital transformation continues at full speed, the majority of humanity's routine activities have begun to be carried out through digital channels. As the world digitizes, the potential loot in the lap of hackers grows. That's why we witness the development of new cyber threats every day. This requires all organizations, from the smallest to the largest, to be prepared for advanced cyber attacks.

Ekran System Provides New Report Customization Opportunities for Microsoft Power BI Users

Ekran System is glad to announce new capabilities for integrating with Microsoft Power BI that will help you simplify data processing and visualization. Since the majority of our customers use Microsoft Power BI to visualize data, optimizing the Ekran System API for working with this tool was a top priority for us. Now, you can easily and quickly export your monitoring data from Ekran System directly to a report template of your choice in Power BI.

Shell Evasion: An Insider Threat

Cybersecurity strategies within cloud environments are often seen as a complicated landscape with rapidly developing technologies, architectures, and terms. Simultaneously, there are continuously motivated individuals and groups trying to utilize vulnerabilities for illicit uses such as to increase access to the data, install malware, disrupt services, and more.

From Behavior Analytics to Security Education: 4 Ways Organizations Should Mitigate Modern Insider Attacks

While the stakes for private sector organizations differ drastically from governments that have to protect state secrets like hacking tools or nuclear technologies, businesses do have their own needs for Data Loss Prevention measures. Organizations can face the threat of data like their intellectual property (IP), source code, customer details, Personally Identifiable Information (PII), financial info, and many other types of information being stolen or corrupted.

Are Your Employees Creating Risks For Your Organization While Working at Home?

This is the important question that Veriato Head of Product & Technology, Jay Godse asks in his new article, published this week. With so many employees working from home, it’s hard for CISOs, managers and HR leaders to know what they are doing, and that creates risk. Don’t wait until it’s too late. Threats to the company are much harder to spot when people are working at home.

Privileged Access Management: Essential and Advanced Practices

Managing access rights of privileged users is one of the cornerstones of data security. That’s why the privileged access management (PAM) market is booming with tools and practices. But this variety of PAM options makes it challenging to figure out which practices and controls your organization can benefit from.