#Insider Threat

Giving Your Best: Jacob Neal

AUGUSTA, Ga. (WJBF)– This month’s Giving Your Best winner is getting a lot of attention for a project he started during COVID. The problem is, he doesn’t want any recognition for his CAM patches. So, we had to trick Jacob Neal into thinking he was a guest on the Jennie Show – and then present […]
Picture for Giving Your Best:  Jacob Neal

Understanding and Addressing Insider Threats

As companies grapple with pandemic-inspired economic uncertainty, operational disruption and business transformation, cybersecurity has increasingly coalesced with these priorities. Several high-profile cybersecurity incidents drove news cycles, prompting leaders to reassess their defensive postures. As a result, Gartner’s 2021 CIO Agenda Survey found that more than half of C-suite executives view...
Picture for Understanding and Addressing Insider Threats

#ISC2Congress: How to Mitigate Evolving Insider Threats

The changing nature of insider threats was described by Lisa Forte, founder, Red Goat Cyber Security, during a keynote presentation at this week’s virtual ISC2 Security Congress 2021. Forte began by noting that traditionally, insider threat actors are seen as ‘bad apples’ within a business, but we have now “moved...

Did you know? Knowledge key in cybersecurity

WRIGHT-PATTERSON AIR FORCE BASE, Ohio – What’s a great and free way to protect your devices? Knowledge. Staying informed and practicing good cyber hygiene is the easiest way to ensure you do not become a victim of or easy target for cybercriminals. Cybersecurity Awareness Month is a great way to...

INFORMS2021 MAS Cluster Committee's Choice Session - Insider Threats

Today's featured session in the INFORMS Military and Security Society cluster at #INFORMS2021 is a Committee's Choice session. COL Paul Goethals, Ph.D. is the Session Chair for Modeling and Measuring Insider Threat. He has a great line up of presentations covering Mitigating Behavior of Poll Workers as an Insider Threat to Elections Security (Natalie Scala), Neural Network Detection for Insider Threats (Brooke Allen), Optimization of the DoD Insider Threat Program (Pier Bos), and Using Neural Hidden Markov Models to Identify Insider Threat Behavior (David J. Elkind). This session (VSA60) is scheduled to take place virtually on Sunday, October 24th from 9:00 - 10:30 am Eastern Time.

Microsoft 365 will get enhanced insider risk management tools

Microsoft is updating Microsoft 365 to allow admins to better manage insider security threats in their environments with improvements to risky activity detection and visibility. Insider Risk Management enables Microsoft 365 cloud services platform customers to detect, investigate, and remediate insider security threats within their organizations across Office, Windows, Azure,...

AVEVA’s CISO Tim Grieveson wants to save the world. Here’s how…

In this exclusive interview, the industrial software veteran reveals how to protect factories, plants and systems from critical failure amid an increasingly hostile attack landscape. The Industrial Internet of Things (IIoT) is a critical electronic ecosystem weaving together businesses and lives around the world. But this sophisticated integrated network of...

Microsoft 365 will tell your boss if you're misbehaving online

Microsoft is working on a couple of updates for its productivity suite that will help businesses keep closer tabs on the ways their employees are using the web. As per a new entry in the company’s product roadmap, the Microsoft 365 compliance center (a service for IT administrators) will soon provide “increased visibility of risky activity using browsers and associated insider risk policy templates”.

Thwarting Insider Threats, Ransomware and Protecting Water and Wastewater Facilities

The Cybersecurity and Infrastructure Security Agency (CISA) – alongside the FBI, EPA, and NSA – recently released a cybersecurity advisory warning of ongoing cyber-threats to U.S. water and wastewater systems (WWS). The advisory warns that attacks against both information technology (IT) and operational technology (OT) are threatening the ability of WWS facilities “to provide clean, potable water to, and effectively manage the wastewater of, their communities.”

Mistreated employees can become insider threats - Lisa Forte

No matter how protective an organization is of its perimeter, it can never be entirely secure. Unhappy and mistreated employees can become insider threats, Lisa Forte, co-founder of Red Goat Cyber Security, told during (ISC)² Security Congress 2021. During her keynote speech, Forte addressed insider threats that, according to her,...

Data Loss Prevention 1 big thing: Advocate for compliance with security policies and associated, legal, and contractual requirements.

Data Loss Prevention 1 big thing: Advocate for compliance with security policies and associated, legal, and contractual requirements. The big picture: Warrant that your process is involved in other parts of security as data loss prevention, email security, and logging and detection, and PKI. Why it matters: Safeguard that your...

Cybersecurity Risks Could Disrupt Businesses on Their Return to the Workplace

One of the UK’s leading insurance brokers is urging businesses to understand the cybersecurity risks associated with returning to the workplace. Towergate Insurance Brokers is warning organisations that in preparation for ‘business as normal’, businesses need to be carrying out risk assessments and rewriting policies to ensure that they are ready for any large-scale return to the office.