Get Pricing Start Free Trial

Insider Threat Blog

Benefits of Insider Threat Detection Software
Posted on Monday, April 11, 2016 by Richard Adhikari
There were 781 data breaches last year, and 783 in 2014, the highest ever, Statista’s figures show– although remember that, since many data breaches take six or more months to discover, 2015’s figures may yet be adjusted. In 2015, nearly 170 million records were exposed, just under twice the 85.6 million exposed in 2014 – but again the figures for 2015 may have to be adjusted upwards over time. Still, it appears that security’s improving – 2009 saw the all-time high for the number of records... Continue Reading →
Insider Threat Playbook
Posted on Saturday, April 9, 2016 by Antonio A. Rucci
Insider Threat Policies and Procedures, a Development Strategy In my last post, I broke down some basic Insider Threat perceptions where they most often focus on the Malicious Insider, when statistically; the vast majority of the Insider Threats are a result of unintended consequences of an authorized user. Before you can begin building an effective security program, you need to understand where the organization currently stands — their Baseline if you will. What is the basic level of... Continue Reading →
FAA Insider Threat Blog
Posted on Friday, April 8, 2016 by Jeffrey Price, CM, CPP, CASP, CHS-II
It’s called NextGen, and if not properly protected, the system designed to make aviation safer, may present the most dangerous risk to the national airspace system and even the nation itself, particularly if  attacked by an insider threat.  NextGen is the ongoing transformation of the Federal Aviation Administration’s complex air traffic control, radar, navigation and weather-prediction systems, from stand-alone equipment, to highly integrated and interdependent computers and digital networks... Continue Reading →
Antonio Rucci
Posted on Friday, April 8, 2016 by Antonio A. Rucci
Unintended Consequences When you hear the term “Insider Threat”, most people are programmed to think of word like Terrorist; Malicious; Criminal, or some other negative connotation. That’s not to say all Insider Threats are malicious in nature. More often than not, Insider Threats are the unintended consequences of an unassuming, negligent, trusted employee, partner, or otherwise authorized user of your corporate environment, rather than a disgruntled employee who is out for retribution against... Continue Reading →
Trusted Agent Insider Threat
Posted on Friday, April 8, 2016 by Jeffrey Price, CM, CPP, CASP, CHS-II
In 2011, a former British Airways worker was convicted on four counts of preparing acts of terrorism. Inspired by the preaching and teaching of al Qaeda’s late propaganda minister, Anwar Al-Awlaki, Rajib Karim, a software engineer, told Awlaki he had access to British Airways servers and could erase all data, causing massive flight disruptions and huge financial loss for the airline. In testimony, airline personnel noted that such an insider attack could have resulted in losses exceeding the... Continue Reading →
2016 Info Security Awards Finalist for Insider Threat
Posted on Sunday, February 28, 2016 by David Mai
Winners Will Be Honored In San Francisco on February 29, 2016 during the annual awards dinner and presentation Boston, MA – February 2016 – ObserveIT announced today that Info Security Products Guide, the industry's leading information security research and advisory guide, has named ObserveIT a finalist for the 12th Annual 2016 Global Excellence Awards in New Product or Service, Forensics, User Behavior Analytics and Auditing. These prestigious global awards recognize security and IT vendors... Continue Reading →
The Great Disconnect
Posted on Tuesday, January 19, 2016 by Richard Adhikari
Approaches to cybersecurity have been in a state of flux since the 1980s, when the move away from mainframes began. We went to mid-range computers running UNIX; then client-server computing raised its many heads and Windows on inexpensive x86 boxes became the thing. The concept of enterprise security changed in tandem, from a centralized approach to hub-and-spoke to endpoint security. With the advent of mobile computing, the concept of defending the network perimeter came along. And, as hackers... Continue Reading →
Monitor Health Care User Behavior Insider Threat Software
Posted on Friday, January 15, 2016 by David Mai
THE SHORTLIST OF ELECTRONIC HEALTH RECORD SYSTEMS YOU NEED VISIBILITY INTO.  In today’s healthcare industry, personal health information (PHI) is everywhere. Healthcare organizations have massive heaps of data on each individual patient, including Social Security numbers, medical records, payment information, employment information and income information. With so much data concentrated in one place, healthcare organizations turn to applications in order to centralize and maintain all customer... Continue Reading →
Insider Threat Detection ObserveIT
Posted on Monday, January 11, 2016 by Gaby Friedlander
The Shortlist of Core Banking and Wealth Management Systems You Need Visibility Into In today’s financial world, banks are relying on countless financial applications to help manage important tasks. Wealth Management, Trading, Revenue Management, Investor Accounting, along with many other business needs are consistently being improved by operating them through financial applications. However, now that these apps are containing vast amounts of customer and company data, organizations are having... Continue Reading →
Insider Threat
Posted on Wednesday, January 6, 2016 by Michael Gordover
No one sees it coming. While all eyes and resources look outward to thwart a data breach by unknown hackers on the other side of the world, sometimes the culprit is only feet away and is, in fact, known. Indeed, a trusted colleague or vetted third-party who has access to important documents and files shouldn’t be overlooked in your organization’s data security plans. Not that every employee harbors ill intentions, but all it takes is for one of them to accidentally release data to unauthorized... Continue Reading →

Pages

Try it Now
Contact Us