Menu

insider threat - News, Features, and Slideshows

News

  • Dtex software fights insider threats

    Dtex Systems, a security company born in Australia 15 years ago, is just now bringing its insider-threat-detection software to the U.S.

    Written by Tim Greene26 Feb. 15 05:00
  • How to recognise the cyber insider threat

    Losing business to a competitor because one of your trusted employees has walked out the door with sensitive information doesn’t need to happen if you look for the signs and put controls in place, according to a panel of cyber security experts.

    Written by Hamish Barwick01 Aug. 14 10:42
  • Take a data-centric approach to securing information in the cloud to protect against the risks of privileged users

    Privileged users such as system, network and domain administrators can pose a significant threat to mission-critical systems or ones holding highly sensitive data. In fact, the consequences of a disruption in service or stolen confidential information can be severe enough ruin a business. Revocation of certifications, loss of critical intellectual property, and exposure to the consequences of a data breach disclosure are all part of the consequences.

    Written by Derek Tumulak, Vormetric VP of product management20 June 13 16:40
  • The 4 leading causes of data security breakdowns

    A string of high-profile data breaches in 2012, from LinkedIn to Global Payments, have kept enterprise data security in the limelight. But most organizations still tend to be reactive and focus on firefighting when it comes to data security, rather than implementing a more effective long-term strategy. Let's examine the four most common pitfalls of this short-sighted approach.

    Written by Ashvin Kamaraju, VP product development and partner management, Vormetric24 Dec. 12 19:46
  • Cisco's internal security team fights to corral BYOD, malware and Wild West environment

    Many organizations have a computer security incident response team (CSIRT) that swoops into action to battle malware outbreaks, other types of cyberattacks and possible insider threats, and at networking giant Cisco, that CSIRT team is made up of about 60 people trying to protect a business with about 75,000 employees.

    Written by Ellen Messmer29 Nov. 12 19:59
  • HoneyPoint: Honeypot for Windows, Linux or Mac

    After over 10 years of active participation in the honeypot community, I was surprised not to have heard of MicroSolved's HoneyPoint Security Server before I started planning this roundup. HoneyPoint runs on Windows, Linux, and Mac OS X, and offers some useful features -- such as "defensive fuzzing" and the ability to track alert status -- that KFSensor and Honeyd don't. But HoneyPoint is neither as easy and complete as KFSensor, nor as flexible and scalable as Honeyd.

    Written by Roger A. Grimes18 Nov. 10 05:47
Computerworld
ARN
Techworld
CMO