Veriato Blog

Veriato Blog

  • The Widespread Risk of Insider Threats

    by Mike Tierney | May 10, 2016
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    There is a great infographic by Deloitte on the topic of insider threats. They've done a wonderful job packing a great deal of information into an easy to understand presentation.
    Full story
  • Best Practices for Mitigating Insider Threats

    by Mike Tierney | May 05, 2016
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Insider Threats
    • Veriato Recon
    Here we highlight 5 of the 19 practices that we believe can have a significant positive impact on your ability to secure against the insider threat.
    Full story
  • What’s in a name? And why change it?

    by Mike Tierney | Feb 29, 2016
    We’ve changed our name to Veriato. So what? Companies change names all the time. Or they change a logo, or their brand color. Why? What prompts an organization to expend the time, effort, and money it takes to change its face to the world?
    Full story
  • Veriato, formerly known as SpectorSoft FAQ

    by Mike Tierney | Feb 17, 2016
    • Veriato News
    • Veriato
    • Spectorsoft
    Wondering how SpectorSoft changing to Veriato may affect you? See below for answers to questions that you may have.
    Full story
  • Is Employee Monitoring Legal?

    by Mike Tierney | Jan 04, 2016
    • Insider Threat
    • Insider Attacks
    • Monitoring Software
    • Veriato 360
    • Monitoring
    • Employee Monitoring
    As the number of costly insider theft, fraud, lower productivity or inappropriate workplace behavior continues to rise, more companies are recognizing the need for an employee monitoring program.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    • Insider Threat
    • UBA
    • User Behavior Analytics
    • Veriato Recon
    • Behavior Analytics
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." The analysts did a great job defining what had beforehand been a largely undefined market.
    Full story
  • The Numbers Boggle The Mind

    by Mike Tierney | Nov 09, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    The vast (overwhelming) majority of your defenses were defeated when the insider became an insider.
    Full story
  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    • Data Leaks
    • Security Solution
    • IP Theft
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at TechCrunch.com.
    Full story
  • The barbarians are through the gate.

    by Mike Tierney | Oct 02, 2015
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat
    Insider threats are a big topic - in the news and here at Veriato. We give webinars advising companies on how to reduce their risk of an insider incident, have published articles on the topic, and offer solutions that improve insider threat detection and facilitate insider incident response.
    Full story
  • One million six hundred ninety-one thousand reasons to look inside

    by Mike Tierney | Sep 28, 2015
    • Insider Threats
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    62% of security professionals who took part in the survey believe insider attacks have become more frequent in the last 12 months.
    Full story
  • The data says it's the data

    by Mike Tierney | Sep 28, 2015
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    63% of survey respondents are most concerned with data leaks stemming from insider attacks.
    Full story
  • Can you keep a secret?

    by Mike Tierney | Sep 02, 2015
    • Protect Data
    • Security Solution
    According to USPTO.gov, trade secrets consist of information and can include formulas, patterns, compilations, programs, devices, methods, techniques or processes.
    Full story
  • Read this. Pick yourself up off the floor. Then Trust, but Verify.

    by Mike Tierney | Aug 04, 2015
    • UBA
    • User Behavior Analytics
    • Behavior Analytics
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato Recon
    Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software, I read a lot about specific insider attacks.
    Full story
  • Dealing With Insider Risk Starts Before They're An Insider

    by Mike Tierney | Jul 29, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Does your company have a 'one size fits all' approach to screening perspective hires?
    Full story
  • The disgruntled employee insider threat

    by Mike Tierney | Jul 17, 2015
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Veriato Recon
    Computerworld UK has a great article out on the insider data breach at Morrisons supermarkets in the United Kingdom.
    Full story
  • Are we counting on a Maginot Line?

    by Mike Tierney | Jun 15, 2015
    • Employee Monitoring
    • Security Solution
    • Data Leaks
    • Data Protection
    A whole lot of time and money gets spent preventing acts or behaviors from happening.
    Full story
  • Attack the problem before the problem attacks you

    by Mike Tierney | Jun 14, 2015
    • Behavior Analytics
    • User Behavior Analytics
    • UBA
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato 360
    In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users.
    Full story
  • Could You Have Seen It Coming?

    by Mike Tierney | Jun 12, 2015
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat
    • Employee Monitoring
    • Veriato Recon
    • Veriato 360
    Congratulations Jo! You've been promoted to Supervisor! Of all the candidates, both internal and external, you stood out as most qualified and most ready for the job.
    Full story
  • Veriato impacts UK police force

    by Mike Tierney | May 08, 2015
    • Security Solution
    • Monitoring Software
    • Monitoring
    The concept of gathering evidence from digital media has evolved from a reactive process relying on law enforcement officers being able to seize and forensically examine computers, tablets and mobile phones.
    Full story
  • Fact: Employees Leave Your Company

    by Mike Tierney | Apr 25, 2015
    • Data Protection
    • Data Leaks
    • Insider Threat
    • Employee Monitoring
    • Veriato 360
    Whether it's a 'the door is always open' farewell, or a 'don't let the door hit you'' see ya, there are steps that must be taken to protect your company's interests.
    Full story