tag >> insider-threat
October 25th, 2016
Today, government is in a transitional phase where agencies are starting to proactively address many cyber-attacks and threats; however, recent breaches, like last year’s OPM hack, demonstrate that we need to detect advanced threats more rapidly.
October 17th, 2016
When it comes to cybersecurity, agencies can make the most progress by addressing insider, as opposed to outsider, threats. In government, most insider breaches can be tied back to two things: a phishing scam or stolen credentials. Following last year’s Cyber Sprint, the federal government has been making strides to become more proactive in implementing authentication policies designed to reduce these types of attacks. Still, in today’s threat landscape--where you must assume there’s going to be some sort of breach or insider mistake--agencies must continue to evolve the attitude of preparedness, focusing on infrastructure and automation to establish an effective risk-based approach to cyber threats.
October 12th, 2016
The insider threat is one of the most powerful attack vectors compromising government information today. Recent reports suggest that 59% of employees steal proprietary data when they quit or are fired; this statistic is especially critical for government agencies to address especially given cases like Edward Snowden and Aaron Alexis.
June 14th, 2016
With more and more agencies going paperless and moving to virtual storage infrastructures, organizations have to bolster their security strategies and learn how to anticipate future attacks. While this has typically meant fortifying network firewalls and securing the cyber perimeter, San Francisco’s FiberWAN data breach showed us in 2008 that threats are not always originating from external sources.
October 13th, 2014
Federal Computer Week recently provided a news brief on two key security challenges – Insider Threat and Data Localization. FBI and Department of Homeland Security research showed that businesses incur significant costs ranging from $5,000 to $3 million because of cyber incidents involving disgruntled or former employees. On the point of data localization – the practice of requiring companies to have data centers in their home jurisdictions – a Google executive has spoken out on the inefficiencies and far reaching network design impact such policies would have on organizations.
October 3rd, 2014
Recent events reminded government & industry of the real & dangerous consequences of insider threats. A cleared, trusted individual inside a government agency was able to gain access to highly sensitive and privileged information with severely damaging results.