What is identity management? IAM definition, uses, and solutions

Identity and access management, or IAM, in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. The core objective of IAM systems is one identity per individual. Once that digital identity has been established, it must be […]

Insider threats and the misuse of privileged credentials

IT professionals may understand what their most valuable assets are, but they are still struggling to safeguard IT assets against the unpredictability of human behaviour. Whilst HR and finance departments are the easiest target for social engineering, it is in fact IT staff who pose the biggest insider risk to networks, whether caused by accidental or intentional actions. […]

New Report Reveals How Accidental Insider Threats Put Organizations at Real Risk

A new report from NTT Security reveals that approximately 25% of insider threats are hostile with the remaining 75% due to accidental or negligent activity. The 2017 Global Threat Intelligence Center (GTIC) Quarterly Threat Intelligence Report also details how insider threats can put an organization at risk without even knowing it. In fact, the GTIC indicates that […]

The Many Faces Of Insider Threats

Read Richard Henderson analyze different types of insider threats on Forbes : You may not realize it, but the majority of data breaches today involve the role of an insider in some capacity. And did you also know that in many cases, these incidents aren’t malicious in nature? Insider incidents come in all shapes and […]

The Emperor’s New Insider Threats

Read Aubre Andrus’ satirical article about the new insider threats on Security Intelligence : The Emperor was the greatest chief information security officer (CISO) in the land. He felt like the inside of his digital castle was as safe as it could be — there were no external attacks to be found. Any fraudster who […]

Insider Threats: Red Flags and Best Practices

Many businesses are finding the source of their greatest concerns are trusted employees with whom they interact every day. The insider threat is growing, with more than half (53%) of organizations confirming insider attacks in the past 12 months and 27% stating they have become more frequent, according to a new study. Read/see the slideshow explain […]

Quarter of UK Employees Have ‘Purposefully Leaked Business Data’

New research from Egress Software Technologies has revealed that one in four (24%) UK employees have intentionally shared confidential business information outside their organization, typically to competitors or new and previous employers. Read about the new report by Egress Software Technologies which reveals that nearly 24 percent employees of United Kingdom businesses have shared confidential […]

The Herman Trend Alert – Employees: The Greatest Cybersecurity Threat

Read why Joyce Gioia says that employees are the biggest cyber security threat to businesses on After Market News : As security measures become more effective, people are the greatest threat to cybersecurity. Writing this month for Stratfor, the global geopolitical intelligence platform, Scott Stewart, the company’s vice president of tactical analysis, was very clear […]

Cyber Security Awareness Month: What to do if staff demand a risky service

Read Howard Solomon’s article about insider threats on IT World Canada : Awareness training is on the minds of many infosec leaders in the past four weeks thanks to the annual Cyber Security Awareness Month campaigns across the country. But while much of the advice deals with ways of getting employees to sharpen their senses, there’s […]

Employees: The Culprits of Security Breaches?

Read why Victor Chukwuemeka says that the employees can be real culprits of security breaches on The Market Moghul : A senior sales executive in a medium-sized company is having a business meeting with a third party at a café bar – a potential client with whom the executive has never met with before. All the […]