Insider Threat

Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation
Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation

Security is not a black and white matter: there are vast shades of grey that exist in even the most well-thought out security architectures. APTs, zero-days, exploits, vulnerabilities, IoT threats, and the ever-present threat from an organization’s own users, all pose significant amounts of risk to your assets and the invaluable data stored on them. Not that many years ago, security was seemingly much easier – park a stateful...

READ MORE
Decentralization of IT Tech Increases Security Risk
Decentralization of IT Tech Increases Security Risk

IT is becoming increasingly decentralized, with purchasing and management decisions being made at the business level. As cloud computing continues to move technology beyond IT, data is increasingly at risk. According to a new study by VMware, 69% of respondents believe IT has become increasingly decentralized over the past 3 years and 57% agree that this decentralization has resulted in the purchasing of non-secure solutions. “The IT Archipelago: Fragmentation...

READ MORE
New Approaches Needed to Address Cloud Security
New Approaches Needed to Address Cloud Security

The shift to the cloud has significantly increased the risks to data security, although the cloud itself is not necessarily to blame. As has been demonstrated, many cloud purchases are made outside the control or oversight of IT, creating a dangerous Shadow IT environment that, when left unmanaged, places corporate data at risk. At the same time, organizations have struggled to adapt their security technologies, with legacy security tools...

READ MORE
Healthcare Breaches Are About to Get Much More Costly
Healthcare Breaches Are About to Get Much More Costly

There are strong indications that the price tag associated with healthcare data breaches is about to go up significantly. While 90% of healthcare organizations have experienced a data breach in the past two years, there's been a dramatic shift in litigation.

READ MORE
Executive Endpoints Are Increasingly At Risk
Executive Endpoints Are Increasingly At Risk

The data on employee endpoints—like laptops, mobile phones, and tablets—is at risk. While theft due to malware is a perennial risk, endpoint data is also at risk of theft through email, cloud storage, and device theft.

READ MORE