Veriato Blog

  • What Is DLP, Why Does It Matter And What Is Your Current Strategy Missing?

    by Dr. Christine Izuakor | Apr 16, 2019
    • data loss prevention software
    • data loss prevention
    • dlp
    • Data Security
    • Data Protection
    Once upon a time, protecting critical data assets meant keeping printed confidential information in locked boxes labeled top secret. As long as these boxes were kept in secured areas, all was well. Today, information has no such physical boundaries. Network perimeters and firewalls have become the new walls, and data classification schemas are the new box labels. This shift led to an evolution in how companies protected their data from leaving their environments. Where video surveillance and locks were used in the past and still provide some value, the virtual equivalents of these protection mechanisms now apply – one of which is Data Loss Prevention (DLP).
    Full story
  • Veriato impacts UK police force

    by Veriato | Apr 02, 2019
    • veriato employee monitoring software
    • veriato software
    • Veriato
    • employee monitoring software
    • Security Solution
    • Monitoring Software
    • Monitoring
    The concept of gathering evidence from digital media has evolved from a reactive process relying on law enforcement officers being able to seize and forensically examine computers, tablets and mobile phones.
    Full story
  • What You Should Know About Ransomware in 2019

    by Dr. Christine Izuakor | Mar 25, 2019
    • Ransomware protection
    • ransomware detection
    • Veriato RansomSafe
    • RansomSafe
    It’s estimated that Ransomware costs will climb to roughly $11.5 billion in 2019, according to CSO Online. The frequency of attacks continues to increase as well. According to a report on Ransomware, these attacks occurred once every 120 seconds in early 2016. By 2017 this spiked to an attack occurring every 40 seconds. In 2019, the frequency is expected to grow to an attack happening every 14 seconds. Malwarebytes reported that 22% of businesses hit by Ransomware were forced to halt all business operations and Symantec recorded an average of 1242 Ransomware detections per day. It seems as though Ransomware attacks show no signs of slowing down any time soon.
    Full story
  • Five ways AI is being used in the cybersecurity industry

    by Veriato | Mar 21, 2019
    • how is ai being used in cybersecurity
    • AI in cybersecurity
    • Artificial Intelligence
    • AI
    Businesses no longer have to spend hours sifting through financial records to detect fraud or manually investigating system logs in the wake of a cyber-attack. AI applications in security are making the lives of consumers, businesses, and today's cyber professionals much easier.
    Full story
  • What is artificial intelligence?

    by Veriato | Mar 19, 2019
    • veriato artificial intelligence
    • veriato ai
    • What is artificial intelligence
    • Artificial Intelligence
    • AI
    Artificial Intelligence is an umbrella term that is often used to describe the evolution of “smart” technology. To better understand the concept, consider the literal definitions of the words.
    Full story
  • What is Machine Learning?

    by Veriato | Mar 04, 2019
    • how can machine learning help with cybersecurity
    • how can machine learning be used for cybersecurity
    • machine learning in cybersecurity
    • Machine Learning
    • Artificial Intelligence
    • AI
    Generally, artificial intelligence is the concept of making systems “smart” and empowering them to complete tasks humans may typically complete. Machine learning, one of many methods used to build artificial intelligence, leverages data and patterns to replicate human behavior with limited human direction.
    Full story
  • What Is an Insider Threat and the 5 Things You Should Know?

    by Veriato | Feb 22, 2019
    • Insider Threats
    • what is an insider threat
    • ueba
    • UBA
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Gone are the days when our greatest inklings of insider threats were employees who never wanted to take vacation and did everything to avoid letting others see the financial records they were maintaining.
    Full story
  • Bad Password Management by Privileged Insiders Puts the Organization at Risk

    by Veriato | Feb 06, 2019
    • Insider Threat Intelligence
    • Insider Attacks
    • Insider Threat
    Ponemon’s 2019 State of Password and Authentication Security Behaviors Report highlights how inappropriate use of privileged password can give insiders the access they need.
    Full story

Search Blog Posts

Filter Blog Posts