Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Insider Threat Detection Software Can Help Increase Employee Productivity

A few years ago, a news story about a man who was being paid six figures to watch cat videos went viral. Unfortunately, his company didn’t realize that this is what they were paying him to do all day. How did this happen? The employee, whom we’ll refer to as “John,” worked for a company in the US and was getting paid six figures as a developer.

What is User and Entity Behavior Analytics and why does it matter?

A lot could happen within 100 days. One could start a new company, travel around the world or train for a marathon. One hundred days is also around the average time that attackers spend frolicking around compromised networks before being detected. For countries in Europe, Middle East, and Africa the number goes up to 175, or almost half of a year. To make matters worse, the longer a breach remains undetected the more expensive it becomes.

What Is DLP, Why Does It Matter And What Is Your Current Strategy Missing?

Once upon a time, protecting critical data assets meant keeping printed confidential information in locked boxes labeled top secret. As long as these boxes were kept in secured areas, all was well. Today, information has no such physical boundaries. Network perimeters and firewalls have become the new walls, and data classification schemas are the new box labels. This shift led to an evolution in how companies protected their data from leaving their environments.

Leveraging document types to improve detection of insider attacks

Egnyte Protect relies heavily on Machine Learning technology to defend you against insider attacks. Powered by the Google Document Understanding AI which was just announced at Google Next 2019 – our advanced insider attack detection identifies access anomalies that could potentially be a data leakage.

Veriato impacts UK police force

Veriato, the leader in the user activity monitoring and analysis market, today reported that their inaugural Police User Group was a resounding success seeing Police staff attend from all over the UK. The event hosted in London demonstrated Veriato's ongoing commitment in providing an essential active monitoring solution used by Professional Standards and Anti-Corruption units across 75% of UK Police forces.

How To Embrace Employee Monitoring Without Compromising Culture

The modern workforce looks a lot different than it did even a decade ago. If employees actually go to a physical office, their workplaces are often defined by open concepts, collaboration and frequent communication. None of this is by accident. Studies consistently show that happy employees are more productive employees, and autonomy and access are two factors that can make employees happy.

What Is an Insider Threat and the 5 Things You Should Know?

Gone are the days when our greatest inklings of insider threats were employees who never wanted to take vacation and did everything to avoid letting others see the financial records they were maintaining. Today, insider threats come in a concerning variety of forms with consequences often exceeding millions of dollars. As time passes, more industries than ever before are feeling the sting of security incidents and breaches stemming from their very own trusted employees and partners.

Bad Password Management by Privileged Insiders Puts the Organization at Risk

Ponemon’s 2019 State of Password and Authentication Security Behaviors Report highlights how inappropriate use of privileged password can give insiders the access they need. Ultimately, the malicious insider needs one thing to perform an act that hurts the organization – access.

Dark Web Recruitment of Employees Puts Organizations at Risk

The idea of your employees being solicited on the Dark Web isn’t a hypothetical; it’s real, it’s tempting, and it’s lucrative. We’ve written previously about the dangers of the Dark Web and why you need to be paying attention as an employer. One of the realities of the dark web is the issue of recruitment.