Daily Insider Threat News – August 17, 2017

Insider Threats Loom Large for Security Pros

When it comes to insider threats, 61% of infosec professionals consider it more difficult to detect and prevent these attacks than external ones, …

BYOD Drives Increase in Insider Threats

Over three-fifths of IT professionals believe that insider threats are more difficult to spot than attacks by malicious third parties, with the explosion in …

Study: Biggest Security Threat Is Within Your Company

The study’s main finding is that nearly half (48 percent) of respondents named insider threats as one of the top two obstacles security teams face.

Financial services: Reduce the cyber risk from within

With IT professionals identifying insider threats as nearly as high a risk to those presented by professional cybercrime syndicates, security measures …

IT Insider Helped Alleged $5m Insider Trading Scheme

New research from Dtex out this week revealed that IT pros overwhelmingly believe insider threats are more difficult to spot than attacks from third …
US Army NETCOM to Deploy Plurilock BioTracker–the First Continuous Identity Authentication for …

Unlike CAC cards that provide only a single point-in-time authentication at log-in and don’t protect against insider threats or stolen or falsified …
Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security

… phishing attacks are a top concern for 37 percent of security professionals surveyed, ahead of insider threats (33 percent) and malware (32 percent).
Securonix SNYPR Wins Prestigious 2017 SIIA CODiE Award for Best Big Data Reporting And …

… lack of effectiveness against advanced hackers and insider threats, while simultaneously seeing the cost of their deployment balloon out of control.

Why protecting data is key in retail customer experience

Moreover, not all insider threats are malicious. An agent could accidentally open a phishing email that exposes sensitive data throughout the network …
Four key steps to improving your cyber defence capabilities

Such detection also needs to cover the potential for insider threats and lateral movement between systems. Not all security threats come from outside.

Discover more from ITMG

Subscribe now to keep reading and get access to the full archive.

Continue reading