Veriato  Formerly  known  as  spectorsoft-logo       Learn More

Veriato Blog

  • Best Practices for Mitigating Insider Threats

    by Mike Tierney | May 05, 2016
    The Software Engineering Group (SEI) at Carnegie Mellon has a highly regarded free report called “Common Sense Guide to Mitigating Insider Threats” that outlines a number of best practices for dealing with insider threats. Here we highlight 5 of the 19 practices that we believe can have a significant positive impact on your ability to secure against the insider threat
    Full story
  • What’s in a name? And why change it?

    by Mike Tierney | Feb 29, 2016
    We’ve changed our name to Veriato. So what? Companies change names all the time. Or they change a logo, or their brand color. Why? What prompts an organization to expend the time, effort, and money it takes to change its face to the world?
    Full story
  • Veriato, formerly known as SpectorSoft FAQ

    by Mike Tierney | Feb 17, 2016
    Wondering how SpectorSoft changing to Veriato may affect you? See below for answers to questions that you may have.
    Full story
  • Is Employee Monitoring Legal?

    by Mike Tierney | Jan 04, 2016
    As the number of costly insider theft, fraud, lower productivity or inappropriate workplace behavior, involving organizations like the NSA, Zynga and HTC, continues to rise, more companies are recognizing the need for an employee monitoring program. However, since this is not as common of a practice as security from outside attacks, it raises many new questions including legality and best practices.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." If you have a Gartner subscription I encourage you to read it. The analysts (Avivah Litan and Mark Nicolett) did a great job defining what had beforehand been a largely undefined market.
    Full story
  • The Numbers Boggle The Mind

    by Mike Tierney | Nov 09, 2015
    When discussing "prevention" of insider threats, what are we really talking about? Prevention is the ideal, but's it not a trivial task. The call is coming from inside the house. The vast (overwhelming) majority of your defenses were defeated when the insider became an insider. Locking someone out that's already in is, again, not trivial. We should do what we can, but at the same time acknowledge that, without adding some new tactics and tools to our strategy, we are going to have insider incidents.
    Full story
  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at TechCrunch.com.
    Full story
  • The barbarians are through the gate.

    by Mike Tierney | Oct 02, 2015
    Insider threats are a big topic - in the news and here at Veriato. We give webinars advising companies on how to reduce their risk of an insider incident, have published articles on the topic, and offer solutions that improve insider threat detection and facilitate insider incident response.
    Full story
  • One million six hundred ninety-one thousand reasons to look inside

    by Mike Tierney | Sep 28, 2015
    We recently sponsored our second significant research effort aimed at helping understand the scope and nature of insider threats. Much like the first, this effort includes some key takeaways:
    Full story
  • The data says it's the data

    by Mike Tierney | Sep 28, 2015
    In our last post we discussed four key takeaways from a recent research effort into the scope and nature of the insider threat. In this post, we'll continue to explore the data ... and the data says it's the data you are most concerned about.
    Full story