Blog Posts Tagged with "Insider Threats"

1a490136c27502563c62267354024cd5

That a Phone in Your Pocket or Are You Scanning My Network?

January 16, 2012 Added by:Malgorzata Skora

Smartphones have become much more powerful over the past few years. Combine this power with the right applications and you can scan a network from the inside in seconds, along with performing several other new types of attacks for information gathering...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Separation of Duties for System Administrators

January 09, 2012 Added by:Rafal Los

How do our organizations treat administrators (more specifically highly privileged users) when they are removed from active duty? It seems that in large organizations the issue is easier to at last draw a line around than in smaller orgs - but the problems remain...

Comments  (1)

296634767383f056e82787fcb3b94864

Was Stratfor Breached By an Insider?

January 03, 2012 Added by:Jeffrey Carr

I'm not accusing Michael Mooney of being involved. I am, however, stating that attacks by insiders who hold a grudge against their employer are common and Mooney's position along with the circumstances around his departure will certainly be explored by law enforcement...

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention - Step 3: Engage Physical Security

December 20, 2011 Added by:Rafal Los

While often missed, this component of security is one of the most critical when it comes to understanding, and fighting the loss of data in your organization in a very real, tangible way. There are three types of threats you want to be aware of from the physical perspective...

Comments  (0)

Bddcc5065237c686cb4d89dba8b276f2

Key Sessions at the CISO Executive Summit 2011

December 03, 2011 Added by:Steven Fox, CISSP, QSA

As information assurance matures, its identity in the organizational culture is merging with the business units it supports. Practitioners are challenged to adapt their skills to the evolution of an infosec business function separate from its legacy association with the IT department...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bank Executive Pleads Guilty to Stealing Nearly $2 Million

December 01, 2011 Added by:Headlines

"Walker... withdrew money from a line of credit in the name of a trust that held an account at Farmers and Merchants. To cover up the scheme, Walker made interest payments on the money supposedly loaned to the trust. Walker will face a maximum sentence of 30 years in federal prison..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PwC’s Economic Crime Survey Focuses on Cybercrime

November 30, 2011 Added by:Headlines

"Many executives have yet to seize upon the serious nature of the cybercrime threat. Cybercrime has emerged as a formidable threat, thanks to deeply determined, highly skilled, and well-organized cybercriminals, from nation states to hacktivists, from criminal gangs to lone-wolf perpetrators..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

GAO Report: IRS Security Controls Continue to Languish

November 16, 2011 Added by:Headlines

The "IRS did not, in GAO’s opinion, maintain effective internal control over financial reporting... These issues increase the risk of unauthorized individuals accessing, altering, or abusing proprietary IRS programs and electronic data and taxpayer information,” the report contends...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

What To Do About Insider Threats

November 14, 2011 Added by:PCI Guru

Insiders must have access to information that the general public or even you business partners do not. As a result, should an employee get sloppy with controls or go “rogue,” you can expect to lose whatever information that person had access. Remember my mantra – security is not perfect...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI and the Insider Threat

October 24, 2011 Added by:PCI Guru

The biggest problem with the insider threat is that it does not matter how much technology you have to protect your assets as it only takes one person in the right place to neutralize every last bit of your security solutions. Just ask anyone any of the recently breached organizations...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Great Infosec Cop-Out?

October 17, 2011 Added by:Javvad Malik

Often, security people find ways to pass the blame onto our end users. In some cases this is justified; but not all the time. And because of this, I feel it’s come to be one of the biggest cop-outs in the field of information security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Over 100 Arrested in Credit Card Fraud Operation

October 10, 2011 Added by:Headlines

"This is by far the largest... identity theft/credit card fraud cases that law enforcement has come across. Credit card fraud and identity theft are two of the fastest growing crimes in the United States, afflicting millions of victims and costing billions..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threat: Guard Indicted for Chinese Espionage

October 03, 2011 Added by:Headlines

Bryan Underwood, a former contract guard working at a U.S. Consulate in China, has been charged in a superseding indictment with one count of attempting to communicate national defense information to a foreign government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Financial Analyst Fined And Jailed for Data Breach

September 30, 2011 Added by:Headlines

Rebollo was arrested in 2008 after an investigation revealed that he had downloaded, possessed, and sold consumer information contained in Countrywide databases. Rebollo distributed financial information and contact information pertaining to approximately 2.5 million individuals...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

A Stuxnet Apocalypse?

September 13, 2011 Added by:Infosec Island Admin

"Could a Stuxnet-like system affect the production and development of a nuclear weapon? Yes and no. Yes as in it certainly could screw up enrichment, obviously, but wouldn’t screw up the end-result - hence why Stuxnet was found in the first place..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Stuxnet Could Be Modified to Undermine Nuclear Weapons

September 12, 2011 Added by:Headlines

"Nuclear warheads are controlled by computers so if someone managed to slip a worm inside a facility that will reach the warhead component, they could launch it and than aim it back at the country’s facility... Stuxnet is the first cyber weapon that could cause major disruption...:

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »