Veriato Blog

  • 3 Steps To Protect Your Data From Leaving With A Departing Insider

    by Mike Tierney | May 25, 2016
    What is the High Risk Exit Period? It’s the period of time between when an insider (employee or contractor) decides to leave the organization - or begins to believe they are going to be asked to leave the organization - and the day they actually do leave.
    Full story
  • The Widespread Risk of Insider Threats

    by Mike Tierney | May 10, 2016
    There is a great infographic put out by the good folks at Deloitte on the topic of insider threats.  They've done a wonderful job packing a great deal of information into an easy to understand presentation.
    Full story
  • Best Practices for Mitigating Insider Threats

    by Mike Tierney | May 05, 2016
    The Software Engineering Group (SEI) at Carnegie Mellon has a highly regarded free report called “Common Sense Guide to Mitigating Insider Threats” that outlines a number of best practices for dealing with insider threats. Here we highlight 5 of the 19 practices that we believe can have a significant positive impact on your ability to secure against the insider threat
    Full story
  • What’s in a name? And why change it?

    by Mike Tierney | Feb 29, 2016
    We’ve changed our name to Veriato. So what? Companies change names all the time. Or they change a logo, or their brand color. Why? What prompts an organization to expend the time, effort, and money it takes to change its face to the world?
    Full story
  • Veriato, formerly known as SpectorSoft FAQ

    by Mike Tierney | Feb 17, 2016
    Wondering how SpectorSoft changing to Veriato may affect you? See below for answers to questions that you may have.
    Full story
  • Is Employee Monitoring Legal?

    by Mike Tierney | Jan 04, 2016
    As the number of costly insider theft, fraud, lower productivity or inappropriate workplace behavior, involving organizations like the NSA, Zynga and HTC, continues to rise, more companies are recognizing the need for an employee monitoring program. However, since this is not as common of a practice as security from outside attacks, it raises many new questions including legality and best practices.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." If you have a Gartner subscription I encourage you to read it. The analysts (Avivah Litan and Mark Nicolett) did a great job defining what had beforehand been a largely undefined market.
    Full story
  • The Numbers Boggle The Mind

    by Mike Tierney | Nov 09, 2015
    When discussing "prevention" of insider threats, what are we really talking about? Prevention is the ideal, but's it not a trivial task. The call is coming from inside the house. The vast (overwhelming) majority of your defenses were defeated when the insider became an insider. Locking someone out that's already in is, again, not trivial. We should do what we can, but at the same time acknowledge that, without adding some new tactics and tools to our strategy, we are going to have insider incidents.
    Full story
  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at
    Full story
  • The barbarians are through the gate.

    by Mike Tierney | Oct 02, 2015
    Insider threats are a big topic - in the news and here at Veriato. We give webinars advising companies on how to reduce their risk of an insider incident, have published articles on the topic, and offer solutions that improve insider threat detection and facilitate insider incident response.
    Full story