Veriato Media Mentions

  • Mar 21, 2017

    How to Assemble a Solid Security Team

    Every company, from the smallest proprietorship to a Fortune 500 member, has valuable assets to protect.

  • Mar 21, 2017

    Try These Apps To Make Your Business More Successful In 2017

    One of the greatest risks to organizations today continues to be security breaches from employees, commonly known as “insider threats.”

  • Mar 10, 2017

    How AI Is Transforming the Workplace

    Artificial intelligence is changing the way managers do their job—from who gets hired to how they’re evaluated to who gets promoted.

    The same technology that enables a navigation app to find the most efficient route to your destination or lets an online store recommend products based on past purchases is on the verge of transforming the office—promising to remake how we look for job candidates, get the most out of workers and keep our best workers on the job.

  • Feb 28, 2017

    Veriato 360 Wins 2017 Cybersecurity Excellence Award

    Veriato, an innovator in actionable user behavior analytics and a global leader in user activity monitoring, today announced that its Veriato 360 solution won a 2017 Cybersecurity Excellence Award in the endpoint security category. Veriato 360 tracks the online and communications activity of employees and contractors, and presents detailed, accurate and actionable data so the organization can investigate and otherwise respond immediately to any insider threat or help improve employee productivity.

  • Jan 9, 2017

    10 Myths About Working with a Remote Virtual Assistant

    Working with a remote virtual assistant (VA) can take your business to the next level. Contracting the services of a VAwill not only reduce cost, it will also increase productivity, improve quality of work and enhance business flexibility.

  • Dec 13, 2016

    An Insider Threat Defined – and How to Prevent It

    The National Security Agency, The Office of Personnel Development, Barclays Bank, Target Stores. What do these organizations have in common? For one thing, they’ve all experienced some of the most publicized examples of insider threats, which, according to 2015 data by the Ponemon Institute, is costing organizations an average of $144,000 per incident (with a high of $4 million!) and as well as significant long-term damage to their organization’s reputation.

  • Dec 9, 2016

    How to Quantify the Risk of an Insider Threat

    Never before have there been so many platforms that let a growing number of people touch, manipulate, download, and share sensitive data.

    But there’s a dark side to all that access: It exposes a company to malicious intent and theft of information worth thousands, sometimes millions, of dollars. More alarming is the fact that less than half (42 percent) of all organizations have the appropriate controls in place to prevent these attacks, according to the Insider Threat Spotlight Report.

  • Nov 7, 2016

    The FBI Scanned Clinton's Emails the Same Way Your Boss Reads Yours

    The FBI said this weekend that an investigative team had worked "around the clock to process and review" emails found on former New York congressman Anthony Weiner's laptop that related to the agency's probe of Hillary Clinton.

  • Nov 11, 2016

    When workplace monitoring, behavioral analytics, and employee privacy collide

    Imagine wristwatch sensors that can detect perspiration and monitor pulse rates – not as part of an exercise regimen, but in a workplace setting. In 2014, an MIT professor used such technology to monitor 57 stock and bond traders in a simulated lab, measuring their ability to handle stress while trading millions of dollars on Wall Street.

  • Sep 28, 2016

    Why Aren't Companies Dealing With Insider Threats?

    Despite clear indications that insider attacks are on the rise, most organizations remain ill-equipped to prevent them. And even though the potential costs of mitigating such attacks can be staggering, the majority of companies don't appear to be allocating additional resources to address the problem.

  • Aug 31, 2016

    The Insider Threat Intelligence You Likely Aren’t Using, But Are Already Paying For

    Not sharing vital information that could help prevent insider threats is far too common. In fact, according to the Insider Threat Spotlight Report (ITSR), crowdsourced by a group of companies and individuals in the security space, 48% of 500 infosec employees surveyed said a lack of collaboration between departments is a significant barrier to better insider threat management, up 10% since last year’s survey. 

  • Aug 19, 2016

    Sage Employee Arrested for Insider Breach

    An employee of the U.K. business software company Sage was arrested at London's Heathrow airport on August 17 in connection with an insider data breach that may have compromised the personal information of employees at 280 British companies.

  • Aug 16, 2016

    Utilizing Administrative Safeguards to Prevent Insider Threats

    Preventing healthcare insider threats needs to be a top priority for covered entities of all sizes, and with cybersecurity threats evolving each day, training methods must also remain current.

  • Aug 9, 2016

    Insider Threats Rise in 2016, and Legal's Data Security is in Danger

    As employee training and user behavior tracking lags, organizations increasingly worry about the dangers of their employee's accidental and negligent actions.

  • Aug 5, 2016

    58% of orgs have no controls in place to prevent insider threats

    More than half of organizations (58 percent) still lack the appropriate controls to prevent insider attacks, with just under half (44 percent) unaware if their organization has experienced an insider attack at all, according to a new survey of more than 500 cybersecurity professionals.

  • Jun 23, 2016

    Steps to take today to reduce the risk when people leave tomorrow

    Imagine putting together a small party for ten people. You worked hard to make the event successful. You invite people into your house -- where you keep your prized possessions

  • Mar 15, 2016

    SpectorSoft Changes Name to Veriato to Reflect Growing Demand for Corporate Truth

    SpectorSoft™, an innovator in user behavior analytics and a global leader in user activity monitoring, today announced it changed its name to Veriato.

  • Mar 17, 2016

    Name change: SpectorSoft is now Veriato

    The new name is intended to reflect a growing demand organizations have to learn what is happening within their organization to prevent insider attacks and increase worker productivity.

  • Apr 5, 2016

    A reality check for security leaders on insider risk

    Mike Tierney shares his insights on successfully implementing processes to combat insider risk by engaging the right people at the right time in the program

  • Apr 6, 2016

    Inside job: What CIOs miss in preventing data leaks

    DLP and user training are good defenses against accidental data loss, but companies need a third approach to detect insider threats