Veriato Blog

Veriato Blog

  • To cloud, or not to cloud. That is the question.

    by Stephen Voorhees, CISSP | Mar 21, 2017
    • Private Cloud
    • Security Solution
    • Cloud
    If you are thinking about storing sensitive information in the cloud, you need to be as sure of the security of that data as you would be storing it on your own infrastructure.
    Full story
  • Don’t Be Held Hostage By Ransomware. Stop The Attack Before Critical Damage Is Done.

    by Mike Tierney | Mar 06, 2017
    • Attacks
    • Malware
    • Veriato RansomSafe
    • Ransomware
    • RansomSafe
    Ransomware, a type of malware that encrypts your critical files until money is paid, continues to wreak havoc on organizations worldwide.
    Full story
  • Step 5 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 14, 2017
    • Insider Threat
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threats
    • Insider Attacks
    One of the best practices found in the Common Sense Guide to Mitigating Insider Threats is the need to develop an employee termination process that takes into account the threat a departing employee can pose.
    Full story
  • Step 4 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 11, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    At a very high level, the risk scores equate to how much the organization sees the position, department, or individual in terms of potential exposure.
    Full story
  • Step 3 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 08, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    In order to establish controls that allow the organization to properly detect insider risk, you must first know where you should be looking. Each position within your company has a relative level of risk associated with it.
    Full story
  • Step 2 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 05, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    Insider risk begins the moment you grant access. What’s required on an employee’s first day is to present them with a CIPA.
    Full story
  • Step 1 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 02, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    Risk around company data normally falls to someone within IT, the security team, or to the CISO, as these individuals will play a crucial role in quantifying and addressing insider risk.
    Full story
  • Intro to Quantifying Insider Risk

    by Mike Tierney | Jan 31, 2017
    • Insider Threat Prevention
    • Insider Threat
    • Insider Threats
    • Insider Threat Detection
    • Insider Attacks
    Risk is one of those subjective concepts that usually fall into vague categories like “low” and “high” – which has very little meaning on its own, and only has value when you tie those categories to actions .
    Full story
  • Quantifying the risk of an insider data leak

    by Mike Tierney | Sep 08, 2016
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Veriato Recon
    • Veriato
    • Risk Scoring
    One of the challenges associated with effectively combating the threat of insider data leaks, stems from a lack of understanding of the risk resident within the perimeter.
    Full story
  • 4 Steps to Reduce the Risk of Malicious Insider Activity

    by Mike Tierney | Jul 01, 2016
    • Insider Threat
    • User Behavior Analytics
    • User Activity Monitoring
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Attacks
    • Employee Monitoring
    • Data Protection
    Improve your organizational ability to detect insider threats before they become insider attacks, react quickly and with confidence to potential (or actual) problems.
    Full story
  • 3 Steps To Protect Your Data From Leaving With A Departing Insider

    by Mike Tierney | May 25, 2016
    • Insider Threat
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    What is the High Risk Exit Period? It’s the period of time between when an insider decides to leave the organization and the day they actually do leave.
    Full story
  • The Widespread Risk of Insider Threats

    by Mike Tierney | May 10, 2016
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    There is a great infographic by Deloitte on the topic of insider threats. They've done a wonderful job packing a great deal of information into an easy to understand presentation.
    Full story
  • Best Practices for Mitigating Insider Threats

    by Mike Tierney | May 05, 2016
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Insider Threats
    • Veriato Recon
    Here we highlight 5 of the 19 practices that we believe can have a significant positive impact on your ability to secure against the insider threat.
    Full story
  • What’s in a name? And why change it?

    by Mike Tierney | Feb 29, 2016
    We’ve changed our name to Veriato. So what? Companies change names all the time. Or they change a logo, or their brand color. Why? What prompts an organization to expend the time, effort, and money it takes to change its face to the world?
    Full story
  • Veriato, formerly known as SpectorSoft FAQ

    by Mike Tierney | Feb 17, 2016
    • Veriato News
    • Veriato
    • Spectorsoft
    Wondering how SpectorSoft changing to Veriato may affect you? See below for answers to questions that you may have.
    Full story
  • Is Employee Monitoring Legal?

    by Mike Tierney | Jan 04, 2016
    • Insider Threat
    • Insider Attacks
    • Monitoring Software
    • Veriato 360
    • Monitoring
    • Employee Monitoring
    As the number of costly insider theft, fraud, lower productivity or inappropriate workplace behavior continues to rise, more companies are recognizing the need for an employee monitoring program.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    • Insider Threat
    • UBA
    • User Behavior Analytics
    • Veriato Recon
    • Behavior Analytics
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." The analysts did a great job defining what had beforehand been a largely undefined market.
    Full story
  • The Numbers Boggle The Mind

    by Mike Tierney | Nov 09, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    The vast (overwhelming) majority of your defenses were defeated when the insider became an insider.
    Full story
  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    • Data Leaks
    • Security Solution
    • IP Theft
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at TechCrunch.com.
    Full story
  • The barbarians are through the gate.

    by Mike Tierney | Oct 02, 2015
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat
    Insider threats are a big topic - in the news and here at Veriato. We give webinars advising companies on how to reduce their risk of an insider incident, have published articles on the topic, and offer solutions that improve insider threat detection and facilitate insider incident response.
    Full story