Get Pricing Start Free Trial

Insider Threat Blog

Posted on Tuesday, October 6, 2015 by Matt Zanderigo
The basic fun and risk of fantasy football is that owners of these hypothetical teams never know how the real-life players will perform in any given game. So any inside knowledge on a player’s game-time status, including how other fantasy players across the nation are positioning that player in their starting lineups, could push a fantasy team over the winning goal line. If you’re a fantasy player with money on the line, inside information can be a particularly worthy nugget as you select... Continue Reading →
Insider Threat Blog
Posted on Wednesday, September 30, 2015 by Matt Zanderigo
According to a new study from the Information Security Community (272,000 members) on LinkedIn, 62 percent of security professionals say insider threats have become more frequent over the last year. The report, Insider Threat Spotlight, also found that less than 50 percent of organizations have appropriate controls to prevent insider attacks. In this blog, you’ll see how the other 50 percent of companies are preventing themselves from insider attacks. The harsh reality is that threat from the... Continue Reading →
Posted on Wednesday, September 16, 2015 by Dimitri Vlachos
The Insider Threat Landscape No one sees it coming. While all eyes and resources look outward to thwart a data breach by unknown hackers on the other side of the world, sometimes the culprit is only feet away and is, in fact, known. Indeed, a trusted colleague or vetted third-party who has access to important documents and files shouldn’t be overlooked in your organization’s data security plans. Not that every employee harbors ill intentions, but all it takes is for one of them to accidentally... Continue Reading →
Posted on Wednesday, September 2, 2015 by Oliver Levin
  As college students, getting adjusted to corporate life can be challenging. Working at ObserveIT has taught us a lot of valuable lessons that we will continue to utilize throughout our lives. #1- It’s Okay to Be an Intern It’s okay to not know the answer to a question, even when asked by one of your superiors. If you pretend to know something you obviously don’t, they WILL call you out, in front of the office, several times. Remember, when they hire you as an intern, they are expecting you... Continue Reading →
Unix Linux Blog
Posted on Monday, August 17, 2015 by Nir Barak
Unix and Linux servers are growing ever more popular in today’s enterprise environment.  With their increased popularity, Unix/Linux systems have become more popular targets for security incidents.  There have been cases of external threats where hackers have gained access to these Unix/Linux servers through the internet. However, the largest threat to your Unix/Linux system is not external, but internal. Unix/Linux Insider Threats: Insider threats can come from anywhere, but in Unix/Linux,... Continue Reading →
Posted on Wednesday, August 12, 2015 by Oliver Levin
2015 has not been kind to the healthcare industry’s information security. A recent infoRiskToday article emphasized five massive data breaches, and a record data loss year for the healthcare industry.  Highlighted by Anthem’s stunning data breach that affected over 78 million people, the past seven months have shown a rising problem in data security in healthcare. According to the federal tally of major health data breaches, over 100 million people have been affected by healthcare data breaches... Continue Reading →
Posted on Thursday, August 6, 2015 by David Mai
The attack on the online adultery site Ashley Madison reported by Brian Krebs last month, could have effected 37 million account holders. Krebs reports that The Impact Team is responsible for the attack and verified some of the data stolen by the group. The Impact Team posted some of the stolen information onto a public site called Pastebin and threatened to publicly post the rest of the stolen data unless Ashley Madison was shut down. For more information about the Ashley Madison breach, read... Continue Reading →
Posted on Monday, August 3, 2015 by Dimitri Vlachos
Ashley Madison is an online dating site designed specifically for married people who want to cheat on their spouses. It operates like most online data sites allowing users to write profile descriptions and add pictures. However, what makes it different is the profile descriptions discuss sexual fantasies and the pictures are often provocative featuring naked pictures of the user. Imagine if this information was ever leaked. Spouses all over the world would discover that their partner was... Continue Reading →
Posted on Monday, July 27, 2015 by Gaby Friedlander
According to the 2015 Insider Threat Spotlight Report, 62% of security professionals have seen a rise in insider attacks over the last twelve months.  The rise has been contributed to insufficient data protection strategies and the lack of employee training and awareness. The last 12 months have seen a continuous catalog of loss and data theft as organizations across all major markets and industry verticals have had to admit their security and data protection shortcomings. The effect of... Continue Reading →
Firekeepers Casino Battle Creek
Posted on Monday, July 13, 2015 by David Mai
On the heels of a May announcement that it was replacing point-of-sale (POS) devices, FireKeepers Casino Hotel in Michigan confirmed Friday that illegal access was gained to its computer systems, personally identifiable information (PII) and payment card information (PCI). An investigation of a data security incident at FireKeepers Casino Hotel discovered that about 85,000 credit and debit cards used between September and April for the purchase of food, drink, and retail items may have been... Continue Reading →

Pages

Try it Now
Contact Us