Insider Threat

What does the name “Panama Papers” bring to your mind? Outed tax evaders? Exposed grafters? Money launderers? Or like me, does your mind go straight to the risk and prevention of insider security breaches? For those of you who don’t habitually pore over the financial or security press, the Panama Papers refers to a massive…

+ read more

Travis Greene
Jul 14, 2016
10:14 am
Reads:
1,349
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
5,653
Score:
5

The animated GI Joe television series featured public service announcements (PSA) at the end of each episode. After the subjects of the PSA learned an important life lesson, such as not talking to strangers, they would say: “Now I know,” to which one of the GI Joes would reply: “And knowing is half the battle!”…

+ read more

Renee Bradshaw
Jun 2, 2015
8:28 am
Reads:
3,027
Score:
Unrated

The idea of driverless cars has fascinated pop culture for many years. From Herbie the Love Bug to KITT from Knight Rider, visions of cars that drive themselves continue to capture our imaginations. Unfortunately, as is the case of driverless cars, we can get ahead of ourselves when trying to develop and use certain technology….

+ read more

Travis Greene
May 26, 2015
3:26 pm
Reads:
2,102
Score:
Unrated

With the release of the 2015 Cyberthreat Defense Report last week this number nerd took some time to review and collate some of the IT Security statistics and numbers that have piqued his interest or curiosity over the last few months. From protecting user data against the growing number of threats to ensuring the continuity…

+ read more

David Shephard
Mar 16, 2015
1:51 pm
Reads:
40,518
Score:
4.75

It’s impossible to tell with any precision if human error in IT is increasing, or decreasing. However, there is plenty of incidental data in the breach headlines of today to support the fact that human, or insider, error is prevalent – and not going away anytime soon. The Hack Heard Round the World For example,…

+ read more

Renee Bradshaw
Dec 22, 2014
9:41 am
Reads:
4,108
Score:
5

This month, a year ago, the U.S. Department of Justice charged Edward Snowden with violating the Espionage Act and theft of government property. Whatever you think of Snowden, Chelsea [Bradley] Manning, that IRS employee who took home data on 20,000 co-workers data theft by employees, contractors or those impersonating “trusted” insiders is not uncommon. The…

+ read more

David Shephard
Jun 19, 2014
9:46 am
Reads:
3,679
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow