Veriato  Formerly  known  as  spectorsoft-logo       Learn More

Veriato Blog

  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at TechCrunch.com.
    Full story
  • The barbarians are through the gate.

    by Mike Tierney | Oct 02, 2015
    Insider threats are a big topic - in the news and here at Veriato. We give webinars advising companies on how to reduce their risk of an insider incident, have published articles on the topic, and offer solutions that improve insider threat detection and facilitate insider incident response.
    Full story
  • One million six hundred ninety-one thousand reasons to look inside

    by Mike Tierney | Sep 28, 2015
    We recently sponsored our second significant research effort aimed at helping understand the scope and nature of insider threats. Much like the first, this effort includes some key takeaways:
    Full story
  • The data says it's the data

    by Mike Tierney | Sep 28, 2015
    In our last post we discussed four key takeaways from a recent research effort into the scope and nature of the insider threat. In this post, we'll continue to explore the data ... and the data says it's the data you are most concerned about.
    Full story
  • Can you keep a secret?

    by Mike Tierney | Sep 02, 2015
    Do you know what secrets your company has? Where they are stored? If they are protected? I’m not referring to the affair going on between the sales rep and the graphic designer. We’re talking about Trade Secrets here.
    Full story
  • Read this. Pick yourself up off the floor. Then Trust, but Verify.

    by Mike Tierney | Aug 04, 2015
    Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software for response and investigation, I naturally read a lot about specific insider attack instances and about risk and threats in general. Rarely does anything surprise me anymore.
    Full story
  • Dealing With Insider Risk Starts Before They're An Insider

    by Mike Tierney | Jul 29, 2015
    Quick question: does your company have a 'one size fits all' approach to screening perspective hires?
    Full story
  • The disgruntled employee insider threat

    by Mike Tierney | Jul 17, 2015
    Computerworld UK has a great article out on the insider data breach at Morrisons supermarkets in the United Kingdom.
    Full story
  • Are we counting on a Maginot Line?

    by Mike Tierney | Jun 15, 2015
    A whole lot of time and money gets spent preventing acts or behaviors from happening. Think about the data loss prevention (DLP) space; I've seen respected analyst firms show the amount of money spent on DLP growing from in the $300'$400 million range in 2010 to upwards of $900 million in 2014.
    Full story
  • Attack the problem before the problem attacks you

    by Mike Tierney | Jun 14, 2015
    In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users. Further, we say that the most common method for gaining visibility into user behavior with core applications is the review of server logs.
    Full story