Blog Posts Tagged with "Insider Threats"

69dafe8b58066478aea48f3d0f384820

Could the IT Staff Hold Your Company Hostage?

May 24, 2011 Added by:Headlines

Report: "A significant number of IT staff could cause chaos for their organizations with their knowledge of and access to digital certificates and encryption keys due to lack of management controls and no separation of duties..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Top Five Business Security Risks

May 17, 2011 Added by:Robert Siciliano

At 2010’s Defcon, a game was played in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out sensitive information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ITRC: Hackers are Winning the Battle of the Breach

May 12, 2011 Added by:Headlines

Unfortunately, it is still difficult to ascertain the true cause of many breaches due to entities publicly stating “the information was stolen” or “due to theft.” Additionally, nearly half of breached entities did not publicly report the number of potentially exposed records...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

AnonOps Network Pwned - Warned of Insider Threat

May 09, 2011 Added by:Headlines

It looks as if AnonOps has been pwned. Reports had surfaced that the hactktivist network AnonOps, which provides communication services used by the rogue movement Anonymous, is apparently battling threats to the integrity of their systems from a disgruntled insider...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Overtake Insiders as Leading Cause of Data Loss

April 22, 2011 Added by:Headlines

The responsibility for protecting personal identifying information is on those who request and store it. All entities that collect personal information need to understand the concept that only they can safeguard our information, and that this safeguarding must be an urgent priority...

Comments  (1)

959779642e6e758563e80b5d83150a9f

Defining the Insider Threat

April 17, 2011 Added by:Danny Lieberman

Mitigating the insider threat requires defining whether or not there IS a threat, and if so, finding the right security countermeasures to mitigate the risk. One wonders whether or not RSA eats their own dog food, and had deployed a data loss prevention system. Apparently not...

Comments  (8)

959779642e6e758563e80b5d83150a9f

Insider Threats and Data Theft

March 21, 2011 Added by:Danny Lieberman

Network DLP is a poor security countermeasure against the WikiLeaks class of data breach. Network DLP can network-intercept but not analyze obfuscated data and is blind to removable media and smart phones. The best technical countermeasure against a leak must be at the point of data use...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats and IRS Network Security Controls

March 16, 2011 Added by:Headlines

The report indicates the IRS failed to limit employee access to sensitive information in accordance with employee's job duties, leaving the agency vulnerable to insider threats. The report also found that the IRS had failed to update critical database software and enable key auditing capabilities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous-Leaked B of A Emails Reveal Nothing

March 14, 2011 Added by:Headlines

In this case it looks as if select emails were leaked without the necessary context to understand their significance in an effort to generate some heat but provide little light, which really only works to satisfy the disgruntled former employee's desire to make trouble...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Infosec Pro's Need to Practice What They Preach

March 10, 2011 Added by:Headlines

The results of the poll indicate that a significant portion of those who are assumed to be more security conscious than most still retain a certain level of complacency when it comes to security best practices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Criminal Hackers Responsible For Most Data Breaches

March 04, 2011 Added by:Robert Siciliano

According to the ITRC, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The majority of these attacks were malicious hacks or insider theft...

Comments  (0)

0c4ca84ec3f3f2d57194f8e0cbd5ba85

Unmasking Security Threats in the Workplace

February 28, 2011 Added by:Lindsay Walker

Corporate security is the responsibility of everyone in the organization - not just the IT department. Security requires commitment from the upper-most levels of the organization so that the appropriate resources are available. No employee should be lazy about corporate security...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Insider Threats: The Stationary Cupboard Test

February 26, 2011 Added by:Javvad Malik

A cashier would just love to dip into the till and grab a wad of used tenner’s every day. But they know that numerous controls in place. However, your typical stationary cupboard generally lacks such sophisticated controls. Which is why you never ever see anyone take just one pen...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Improving Insider Threat Testing

February 03, 2011 Added by:Rob Fuller

We need to build organizations up in the detection department from a pentesters point of view. We are loosing this battle, and one of the reasons is we keep our bag of tricks to ourselves, and that's what insider threat testing is all about, getting all the tricks tested in a more open fashion...

Comments  (1)

65be44ae7088566069cc3bef454174a7

HIPAA Compliance Investigations and the Insider Threat

February 02, 2011 Added by:Rebecca Herold

The insider threat is significant in all organizations, but impossible to eliminate completely. However, organizations can significantly reduce the associated risks, and demonstrate due diligence for implementing safeguards, by doing the following...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Insider Threats: Big Enough to be Parodied on The Simpsons

January 25, 2011 Added by:Headlines

If you have been parodied on the long running prime-time animated series The Simpsons, you can rest assured that you have finally arrived. The most recent member of the coveted Simpson parody club is, believe it or not, none other than the Insider Threat...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »