Veriato  Formerly  known  as  spectorsoft-logo       Learn More

Veriato Blog

  • Quantifying the risk of an insider data leak

    by Mike Tierney | Sep 08, 2016

    One of the challenges associated with effectively combating the threat of insider data leaks, stems from a lack of understanding of the risk resident within the perimeter.

    Full story
  • 4 Steps to Reduce the Risk of Malicious Insider Activity

    by Mike Tierney | Jul 01, 2016
    Our CSO, David Green, has a new whitepaper out. Here he addresses some practical things you can do to improve your organizational ability to detect insider threats before they become insider attacks, react quickly and with confidence to potential (or actual) problems, and in doing so increase the security of you intellectual property and confidential information.
    Full story
  • 3 Steps To Protect Your Data From Leaving With A Departing Insider

    by Mike Tierney | May 25, 2016
    What is the High Risk Exit Period? It’s the period of time between when an insider (employee or contractor) decides to leave the organization - or begins to believe they are going to be asked to leave the organization - and the day they actually do leave.
    Full story
  • The Widespread Risk of Insider Threats

    by Mike Tierney | May 10, 2016
    There is a great infographic put out by the good folks at Deloitte on the topic of insider threats.  They've done a wonderful job packing a great deal of information into an easy to understand presentation.
    Full story
  • Best Practices for Mitigating Insider Threats

    by Mike Tierney | May 05, 2016
    The Software Engineering Group (SEI) at Carnegie Mellon has a highly regarded free report called “Common Sense Guide to Mitigating Insider Threats” that outlines a number of best practices for dealing with insider threats. Here we highlight 5 of the 19 practices that we believe can have a significant positive impact on your ability to secure against the insider threat
    Full story
  • What’s in a name? And why change it?

    by Mike Tierney | Feb 29, 2016
    We’ve changed our name to Veriato. So what? Companies change names all the time. Or they change a logo, or their brand color. Why? What prompts an organization to expend the time, effort, and money it takes to change its face to the world?
    Full story
  • Veriato, formerly known as SpectorSoft FAQ

    by Mike Tierney | Feb 17, 2016
    Wondering how SpectorSoft changing to Veriato may affect you? See below for answers to questions that you may have.
    Full story
  • Is Employee Monitoring Legal?

    by Mike Tierney | Jan 04, 2016
    As the number of costly insider theft, fraud, lower productivity or inappropriate workplace behavior, involving organizations like the NSA, Zynga and HTC, continues to rise, more companies are recognizing the need for an employee monitoring program. However, since this is not as common of a practice as security from outside attacks, it raises many new questions including legality and best practices.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." If you have a Gartner subscription I encourage you to read it. The analysts (Avivah Litan and Mark Nicolett) did a great job defining what had beforehand been a largely undefined market.
    Full story
  • The Numbers Boggle The Mind

    by Mike Tierney | Nov 09, 2015
    When discussing "prevention" of insider threats, what are we really talking about? Prevention is the ideal, but's it not a trivial task. The call is coming from inside the house. The vast (overwhelming) majority of your defenses were defeated when the insider became an insider. Locking someone out that's already in is, again, not trivial. We should do what we can, but at the same time acknowledge that, without adding some new tactics and tools to our strategy, we are going to have insider incidents.
    Full story