Veriato Blog

Veriato Blog

  • The Numbers Boggle The Mind

    by Mike Tierney | Nov 09, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    The vast (overwhelming) majority of your defenses were defeated when the insider became an insider.
    Full story
  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    • Data Leaks
    • Security Solution
    • IP Theft
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at TechCrunch.com.
    Full story
  • The barbarians are through the gate.

    by Mike Tierney | Oct 02, 2015
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat
    Insider threats are a big topic - in the news and here at Veriato. We give webinars advising companies on how to reduce their risk of an insider incident, have published articles on the topic, and offer solutions that improve insider threat detection and facilitate insider incident response.
    Full story
  • One million six hundred ninety-one thousand reasons to look inside

    by Mike Tierney | Sep 28, 2015
    • Insider Threats
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    62% of security professionals who took part in the survey believe insider attacks have become more frequent in the last 12 months.
    Full story
  • The data says it's the data

    by Mike Tierney | Sep 28, 2015
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    63% of survey respondents are most concerned with data leaks stemming from insider attacks.
    Full story
  • Can you keep a secret?

    by Mike Tierney | Sep 02, 2015
    • Protect Data
    • Security Solution
    According to USPTO.gov, trade secrets consist of information and can include formulas, patterns, compilations, programs, devices, methods, techniques or processes.
    Full story
  • Read this. Pick yourself up off the floor. Then Trust, but Verify.

    by Mike Tierney | Aug 04, 2015
    • UBA
    • User Behavior Analytics
    • Behavior Analytics
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato Recon
    Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software, I read a lot about specific insider attacks.
    Full story
  • Dealing With Insider Risk Starts Before They're An Insider

    by Mike Tierney | Jul 29, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Does your company have a 'one size fits all' approach to screening perspective hires?
    Full story
  • The disgruntled employee insider threat

    by Mike Tierney | Jul 17, 2015
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Veriato Recon
    Computerworld UK has a great article out on the insider data breach at Morrisons supermarkets in the United Kingdom.
    Full story
  • Are we counting on a Maginot Line?

    by Mike Tierney | Jun 15, 2015
    • Employee Monitoring
    • Security Solution
    • Data Leaks
    • Data Protection
    A whole lot of time and money gets spent preventing acts or behaviors from happening.
    Full story
  • Attack the problem before the problem attacks you

    by Mike Tierney | Jun 14, 2015
    • Behavior Analytics
    • User Behavior Analytics
    • UBA
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato 360
    In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users.
    Full story
  • Could You Have Seen It Coming?

    by Mike Tierney | Jun 12, 2015
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat
    • Employee Monitoring
    • Veriato Recon
    • Veriato 360
    Congratulations Jo! You've been promoted to Supervisor! Of all the candidates, both internal and external, you stood out as most qualified and most ready for the job.
    Full story
  • Veriato impacts UK police force

    by Mike Tierney | May 08, 2015
    • Security Solution
    • Monitoring Software
    • Monitoring
    The concept of gathering evidence from digital media has evolved from a reactive process relying on law enforcement officers being able to seize and forensically examine computers, tablets and mobile phones.
    Full story
  • Fact: Employees Leave Your Company

    by Mike Tierney | Apr 25, 2015
    • Data Protection
    • Data Leaks
    • Insider Threat
    • Employee Monitoring
    • Veriato 360
    Whether it's a 'the door is always open' farewell, or a 'don't let the door hit you'' see ya, there are steps that must be taken to protect your company's interests.
    Full story