Insider Threat

Forrester and Absolute Webinar Feb. 9th: Mastering Endpoint Security

Do You Know Where Your Endpoints Are? Security, risk and IT professionals are dealing with staggering amounts of endpoint-related data loss and exposure. The proliferation of mobile devices, the Cloud and the decentralization of IT / Shadow IT and IoT all amplify the chance that an endpoint will be the source of a data breach. One estimate suggests that, by 2020, the amount of data stored on devices will...

READ MORE
Cloud Use Exacerbates Alert Fatigue
Cloud Use Exacerbates Alert Fatigue

It has been estimated that 90% of organizations will suffer at least one security incident this year. There is no question that organizations are suffering more data security incidents than ever before and that more of these incidents are translating into data breaches than ever before. While prevention is always important, detection and response are just as important. Research indicates it can take an average of 256 days to...

READ MORE
IT Pros Consider People Biggest Threat to Cloud Security
IT Pros Consider People Biggest Threat to Cloud Security

Mirroring the findings from the Business Perception of IT Security, which found that the Insider Threat (careless or uninformed employee actions) were the root cause of most data breaches and the top cyberthreat, the Cloud Security Survey from Netwrix found that 61% of respondents believe their own employees pose more risk to data security in the cloud than anyone else. The second annual Cloud Security Survey polled 600 IT professionals from technology, government, healthcare,...

READ MORE
Predictions for Corporate Data in 2017: The Endpoint is Everywhere
Predictions for Corporate Data in 2017: The Endpoint is Everywhere

As 2016 nears the end, it would be satisfying to gaze back on all the successes that organizations have had in combatting the rising tide of data risks. Sadly, that tide keeps on rising. Data breaches in 2016 are already up 31% over 2015 figures, breaching over 35 million records, a figure set to rise to 1.35 billion breached records with the news of the massive breach at Yahoo....

READ MORE
Invest in your Security Culture
Invest in your Security Culture

Although the risk landscape facing organizations is always changing, the insider threat consistently remains the top source of data breaches. The insider threat is there to amplify any threat: cyberattacks, BYOD, cloud, IoT. Every new threat is made worse by people. So, how do you address the Insider Threat? The top of every list now is the recognition that the solution to the Insider Threat does not come in...

READ MORE