Get Pricing Start Free Trial

Insider Threat Blog

Posted on Wednesday, August 24, 2016 by David Mai
CISO’s see servers and devices, apps and logs, traffic and clouds. With the Splunk® platform security teams are able to see data—everywhere. This kind of Operational Intelligence enables the curious to look closely at what others ignore—machine data—and find what others never see: insights that can help make a company more productive, profitable, competitive and secure. But machine data, no matter how well it’s organized, can be cumbersome to sift through when trying to swiftly investigate an... Continue Reading →
Posted on Wednesday, August 17, 2016 by David Mai
Former Employee Arrested for Taking Customer’s Identity! Former Bank Employee Arrested for Stealing from Customer’s Account! The headlines are rolling in almost daily, as employees are being arrested for Insider Threat offenses. As such, CISO’s are increasingly realizing the importance of getting ahead of the problem by developing a comprehensive Insider Threat Management Program. As any effective CISO knows, user activity monitoring - complete with video recording and playback – is an absolute... Continue Reading →
Posted on Friday, July 29, 2016 by David Mai
This is part three in our three-part series about the problems with DLP. Now that we’ve discussed the headaches endpoint DLP solutions cause, and we’ve figured out the DLP doesn’t work on its own (it doesn’t take the people problem into consideration), we can now talk about the solution! With ObserveIT you can augment DLP, so you can prevent both external and internal threats. Here are 7 security controls ObserveIT provides to help you deal with Insiders before they become threats: 1.     ... Continue Reading →
Posted on Tuesday, July 26, 2016 by Michael Gordover
Has anyone at your company (or even you!) ever used a work laptop to view adult websites or gaming sites? If so, you need to be aware of a new virus that’s targeting people for blackmail -- and adding yet another attack vector that corporations must understand and mitigate in the war against insider threat. A new Trojan called Delilah goes after individuals via social engineering, using a would-be victim’s webcam to capture compromising footage in order to extort them into an action – such as... Continue Reading →
Posted on Tuesday, July 19, 2016 by David Mai
ObserveIT is a lightweight endpoint solution that is focused on identifying and eliminating insider threats. By continuously monitoring user behavior, ObserveIT alerts IT and security teams to activities that put your organization at risk. Here are the Top 4 Reasons you need User Activity Monitoring Now!  Real-Time Security Awareness With optional notification to users that their session is being recorded, instances of unsanctioned and reckless activity decrease dramatically.  IT users can be... Continue Reading →
Posted on Tuesday, July 5, 2016 by Gaby Friedlander
There is a lot to keep in mind when protecting your business from insider threats. Between trying to understand what to look for and whom to watch, staying on top of security threats requires a smart approach. To help on that end, here are five key considerations to further understand insider threats: Consideration #1: Every Business Function is a Potential Source of Risk It’s easy to assume that vital financial and legal documents are the only things at risk from insider threats. But in... Continue Reading →
Posted on Wednesday, June 29, 2016 by David Mai
Today at ObserveIT, we tweeted out an article about Javascript malware spreading on Facebook via Google chrome:   Researchers found that the Javascript malware works by sending users a notification that they have been tagged in a comment by one of their Facebook friends. Once the user clicks the link, the malware automatically begins to download on their device. Then, when the user clicks on certain files and images, the malware becomes executed; infecting the computer. I didn’t know about the... Continue Reading →
Posted on Friday, June 24, 2016 by Gaby Friedlander
This article is a more in-depth discussion on a previous article: Digital Investigation & HR: An Insider Threat Checklist. You’ve just performed a digital investigation of an employee and determined they are an insider threat. What’s the best way to confront an insider threat? Here, Doug Sampson, Founder & CEO at Soteritech discusses the Human Aspect of Insider Threat Investigations. First things first. When you first receive an out-of-policy notification or a tip comes in, your Hub... Continue Reading →
Sneaky Employee?
Posted on Thursday, June 23, 2016 by Michael Gordover
Update, June 23, 2016: According to the Toledo Blade:  Jamie Knapp was found guilty of accessing confidential patient records. After 2 hours of deliberation, a U.S. District Court jury returned the verdict for Jamie Knapp, 26, of Adrian on a misdemeanor count of obtaining individually identifiable health information. She faces a maximum sentence of a year in prison for a violation of the federal Health Insurance Portability and Accountability Act. Prosecutors have said Knapp accessed more than... Continue Reading →
Posted on Wednesday, June 22, 2016 by Gaby Friedlander
This is part two in our three-part series about the problems with DLP. A lot of the companies we meet with are using DLP for web and email, but they have exhausted all efforts to justify ROI. Every day, we speak with cyber security professionals who want to rip it out in frustration after encountering troubled installations, blue screens, fruitless classifications and hundreds of high-maintenance rules.  So, how do you fix the problem? You know the pain points and shortcomings of your endpoint... Continue Reading →

Pages

  • English
  • Français
  • русский
  • 简体中文
  • Deutsch
  • 日本語
  • Português
  • Español
Try it Now
Contact Us