For many businesses, and in some cases government institutions, the popular question arises: what is an insider threat? This may not be the first…
User Analytics
How to Enlist Employees in Your Battle Against Insider Threats
The specter of insider threats hangs over every employee in an organization. An employee can inadvertently be a threat after opening a suspicious email,…
Insider Threat Monitoring Tactics
What does it take to stay ahead of insider threats? A monitoring program that includes a combination of profiling, policies and processes, and software.
SME Cyber Security Access: Top Tools for Tight Budgets
Have you ever knew exactly what you needed but just couldn’t afford it? Perhaps even your systems were not up to standard for the…
Consider a Framework Approach to Link Employee Productivity and Business Performance
We live in a golden age for business where we are awash in technology yet still cannot seem to reliably manage projects. Even boosting…
How BYOD Is Impacting Insider Threats
Gartner believes that by 2021, 27% of corporate data traffic will bypass perimeter security (an increase from 10% today) and flow directly from mobile…
Inside the LaunchPoint Data Breach: Insider Threats
So far in 2017, the healthcare sector has reported 233 breach incidents - affecting over 3 million patient records - to the US Department…
Save a Life Twice: How to Keep Your Healthcare Practice Secure
There's no denying it, your organization does amazing work everyday helping patients to meet their healthcare needs. The ability to help your patients is…
Can Machine Learning Help Identify Radicalization Among Students?
Student radicalization on college campuses is a growing concern, with the same processes happening even in high schools now. Education institutions often are wonderful…
What Behavior Analytics Tells You About Your Operations
Behavior analytics can be used in a number of different ways for a company or organization’s improvement. Behavioral analytics is essentially an analysis on…
4 Different Types of Insider Attacks [Infographic]
The insider threat poses a serious security threat to companies. Traditionally, businesses have built defenses against malicious activity from the outside and inwards towards…
Analytics: What Cyber Security Can Learn From the Private Sector
In cyber security, the use of analytics is a relatively young area. During the RSA Conference 2017 AsiaPacific and Japan, the Chief Technology Officer…