Veriato Media Mentions

  • Nov 20, 2017

    Dangerous data breach at Heathrow: How insiders can threaten public safety

    A USB stick was found in the streets of London containing over 70 unencrypted security files from Heathrow International Airport - so what security precautions could and should have prevented this danger to the public?

  • Nov 18, 2017

    AI could help your boss track your performance, for better or for worse

    For better or worse, your boss is responsible for ensuring that your time at work is spent productively. In this area, AI can perform remarkably well. Tech company Veriato specializes in employee management software that monitors all computer use, Big Brother-style. Its AI logs all activity on company computers and can analyze this data to determine who’s spending extra time on work and who’s goofing off. It can even measure morale through a close reading of emails and messages.

    Some might consider productivity-enhancing technologies like these to be a violation of privacy, but on company time, everything you do that isn’t work-related costs the company money. It’s logical that employers would utilize AI solutions to ensure all employees spend their time actually working.

  • Sep 26, 2017

    Intact Software Distribution adds Veriato to its stable

    Specialist security solutions distributor Intact Software Distribution has added Veriato’s range of intelligent solutions to its portfolio. 60% of all Cyber Attacks come from “The Inside”. Veriato provides organisations with visibility into, and understanding of, the human behaviours and activities occurring within their network.

  • Sep 27, 2017

    Companies Doubt Their Ability to Detect, Respond to and Remediate Ransomware Attacks, According to New Survey

    Companies aren’t very confident in their ability to detect, respond to and remediate ransomware attacks, according to the 2017 Ransomware Report, sponsored by user behavior analytics and activity monitoring company Veriato and 13 other companies and conducted by Crowd Research Partners.

  • Sep 26, 2017

    New Cybersecurity Report Shows Companies Are Alarmingly Unprepared to Deal with Ransomware Threats

    WASHINGTON--()--Crowd Research Partners today released the 2017 Ransomware Report, which shows that companies and government agencies are overwhelmed by frequent, severe ransomware attacks, which have now become the #1 cyber threat to organizations.

  • Sep 10, 2017

    Newsmakers: People on the move in Palm Beach County business

    Veriato has hired two directors.

  • Aug 29, 2017

    Global Log Managements Market 2017 Splunk, Logrhythm, Alert Logic, Loggly, Alienvault, Veriato

    The Log Managements Market 2017 inspects the execution of the Log Managements advertise, encasing a top to bottom judgment of the Log Managements showcase state and the aggressive scene comprehensively. This report breaks down the capability of Log Managements market in the present and in addition the future prospects from different points in detail.

  • Mar 21, 2017

    How to Assemble a Solid Security Team

    Every company, from the smallest proprietorship to a Fortune 500 member, has valuable assets to protect.

  • Mar 21, 2017

    Try These Apps To Make Your Business More Successful In 2017

    One of the greatest risks to organizations today continues to be security breaches from employees, commonly known as “insider threats.”

  • Mar 10, 2017

    How AI Is Transforming the Workplace

    Artificial intelligence is changing the way managers do their job—from who gets hired to how they’re evaluated to who gets promoted.

    The same technology that enables a navigation app to find the most efficient route to your destination or lets an online store recommend products based on past purchases is on the verge of transforming the office—promising to remake how we look for job candidates, get the most out of workers and keep our best workers on the job.

  • Feb 28, 2017

    Veriato 360 Wins 2017 Cybersecurity Excellence Award

    Veriato, an innovator in actionable user behavior analytics and a global leader in user activity monitoring, today announced that its Veriato 360 solution won a 2017 Cybersecurity Excellence Award in the endpoint security category. Veriato 360 tracks the online and communications activity of employees and contractors, and presents detailed, accurate and actionable data so the organization can investigate and otherwise respond immediately to any insider threat or help improve employee productivity.

  • Jan 9, 2017

    10 Myths About Working with a Remote Virtual Assistant

    Working with a remote virtual assistant (VA) can take your business to the next level. Contracting the services of a VAwill not only reduce cost, it will also increase productivity, improve quality of work and enhance business flexibility.

  • Dec 13, 2016

    An Insider Threat Defined – and How to Prevent It

    The National Security Agency, The Office of Personnel Development, Barclays Bank, Target Stores. What do these organizations have in common? For one thing, they’ve all experienced some of the most publicized examples of insider threats, which, according to 2015 data by the Ponemon Institute, is costing organizations an average of $144,000 per incident (with a high of $4 million!) and as well as significant long-term damage to their organization’s reputation.

  • Dec 9, 2016

    How to Quantify the Risk of an Insider Threat

    Never before have there been so many platforms that let a growing number of people touch, manipulate, download, and share sensitive data.

    But there’s a dark side to all that access: It exposes a company to malicious intent and theft of information worth thousands, sometimes millions, of dollars. More alarming is the fact that less than half (42 percent) of all organizations have the appropriate controls in place to prevent these attacks, according to the Insider Threat Spotlight Report.

  • Nov 7, 2016

    The FBI Scanned Clinton's Emails the Same Way Your Boss Reads Yours

    The FBI said this weekend that an investigative team had worked "around the clock to process and review" emails found on former New York congressman Anthony Weiner's laptop that related to the agency's probe of Hillary Clinton.

  • Nov 11, 2016

    When workplace monitoring, behavioral analytics, and employee privacy collide

    Imagine wristwatch sensors that can detect perspiration and monitor pulse rates – not as part of an exercise regimen, but in a workplace setting. In 2014, an MIT professor used such technology to monitor 57 stock and bond traders in a simulated lab, measuring their ability to handle stress while trading millions of dollars on Wall Street.

  • Sep 28, 2016

    Why Aren't Companies Dealing With Insider Threats?

    Despite clear indications that insider attacks are on the rise, most organizations remain ill-equipped to prevent them. And even though the potential costs of mitigating such attacks can be staggering, the majority of companies don't appear to be allocating additional resources to address the problem.

  • Aug 31, 2016

    The Insider Threat Intelligence You Likely Aren’t Using, But Are Already Paying For

    Not sharing vital information that could help prevent insider threats is far too common. In fact, according to the Insider Threat Spotlight Report (ITSR), crowdsourced by a group of companies and individuals in the security space, 48% of 500 infosec employees surveyed said a lack of collaboration between departments is a significant barrier to better insider threat management, up 10% since last year’s survey. 

  • Aug 19, 2016

    Sage Employee Arrested for Insider Breach

    An employee of the U.K. business software company Sage was arrested at London's Heathrow airport on August 17 in connection with an insider data breach that may have compromised the personal information of employees at 280 British companies.

  • Aug 16, 2016

    Utilizing Administrative Safeguards to Prevent Insider Threats

    Preventing healthcare insider threats needs to be a top priority for covered entities of all sizes, and with cybersecurity threats evolving each day, training methods must also remain current.