Blog Posts Tagged with "Insider Threats"

4c1c5119b03285e3f64bd83a8f9dfeec

On Software Vendor Access to Customer Data

January 30, 2012 Added by:Ben Kepes

The issue is a massive one for the industry and in a back-channel discussions a number of people made comments regarding how much of a risk to the cloud industry service provider access to data is. One person went on to say that this perception is poison to sales growth...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Compliance and Security Trends

January 29, 2012 Added by:Danny Lieberman

Information security and risk analysis is complex stuff, with multiple dimensions of people, software, performance, management, technology, assets, threats, vulnerabilities and control relationships. This is why it’s hard to sell security to organizations...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Programmer Charged with Stealing Code from Federal Reserve

January 19, 2012 Added by:Headlines

“As today’s case demonstrates, our cyber infrastructure is vulnerable not only to cybercriminals and hackers, but also alleged thieves like Bo Zhang who used his position as a contract employee to steal government intellectual property"...

Comments  (1)

1a490136c27502563c62267354024cd5

That a Phone in Your Pocket or Are You Scanning My Network?

January 16, 2012 Added by:Malgorzata Skora

Smartphones have become much more powerful over the past few years. Combine this power with the right applications and you can scan a network from the inside in seconds, along with performing several other new types of attacks for information gathering...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Separation of Duties for System Administrators

January 09, 2012 Added by:Rafal Los

How do our organizations treat administrators (more specifically highly privileged users) when they are removed from active duty? It seems that in large organizations the issue is easier to at last draw a line around than in smaller orgs - but the problems remain...

Comments  (1)

296634767383f056e82787fcb3b94864

Was Stratfor Breached By an Insider?

January 03, 2012 Added by:Jeffrey Carr

I'm not accusing Michael Mooney of being involved. I am, however, stating that attacks by insiders who hold a grudge against their employer are common and Mooney's position along with the circumstances around his departure will certainly be explored by law enforcement...

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention - Step 3: Engage Physical Security

December 20, 2011 Added by:Rafal Los

While often missed, this component of security is one of the most critical when it comes to understanding, and fighting the loss of data in your organization in a very real, tangible way. There are three types of threats you want to be aware of from the physical perspective...

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Key Sessions at the CISO Executive Summit 2011

December 03, 2011 Added by:Steven Fox, CISSP, QSA

As information assurance matures, its identity in the organizational culture is merging with the business units it supports. Practitioners are challenged to adapt their skills to the evolution of an infosec business function separate from its legacy association with the IT department...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bank Executive Pleads Guilty to Stealing Nearly $2 Million

December 01, 2011 Added by:Headlines

"Walker... withdrew money from a line of credit in the name of a trust that held an account at Farmers and Merchants. To cover up the scheme, Walker made interest payments on the money supposedly loaned to the trust. Walker will face a maximum sentence of 30 years in federal prison..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PwC’s Economic Crime Survey Focuses on Cybercrime

November 30, 2011 Added by:Headlines

"Many executives have yet to seize upon the serious nature of the cybercrime threat. Cybercrime has emerged as a formidable threat, thanks to deeply determined, highly skilled, and well-organized cybercriminals, from nation states to hacktivists, from criminal gangs to lone-wolf perpetrators..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

GAO Report: IRS Security Controls Continue to Languish

November 16, 2011 Added by:Headlines

The "IRS did not, in GAO’s opinion, maintain effective internal control over financial reporting... These issues increase the risk of unauthorized individuals accessing, altering, or abusing proprietary IRS programs and electronic data and taxpayer information,” the report contends...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

What To Do About Insider Threats

November 14, 2011 Added by:PCI Guru

Insiders must have access to information that the general public or even you business partners do not. As a result, should an employee get sloppy with controls or go “rogue,” you can expect to lose whatever information that person had access. Remember my mantra – security is not perfect...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI and the Insider Threat

October 24, 2011 Added by:PCI Guru

The biggest problem with the insider threat is that it does not matter how much technology you have to protect your assets as it only takes one person in the right place to neutralize every last bit of your security solutions. Just ask anyone any of the recently breached organizations...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Great Infosec Cop-Out?

October 17, 2011 Added by:Javvad Malik

Often, security people find ways to pass the blame onto our end users. In some cases this is justified; but not all the time. And because of this, I feel it’s come to be one of the biggest cop-outs in the field of information security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Over 100 Arrested in Credit Card Fraud Operation

October 10, 2011 Added by:Headlines

"This is by far the largest... identity theft/credit card fraud cases that law enforcement has come across. Credit card fraud and identity theft are two of the fastest growing crimes in the United States, afflicting millions of victims and costing billions..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threat: Guard Indicted for Chinese Espionage

October 03, 2011 Added by:Headlines

Bryan Underwood, a former contract guard working at a U.S. Consulate in China, has been charged in a superseding indictment with one count of attempting to communicate national defense information to a foreign government...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »