Veriato Blog

Tag Results

  • Five Concerning Breaches That Started With an Insider Threat

    by Dr. Christine Izuakor | Apr 29, 2019
    • Insider Threat
    Behind every breach is a human or entity orchestrating an attack to make it happen. Within the affected organization, there is usually a human action that leads to the success of the attack. It could be a careless employee that clicked on a phishing email, a disgruntled employee that leaked confidential information to a competitor, or someone who wrote their username and password in a notebook that they lost while traveling. The list of events goes on and on. With so many examples, we have an opportunity to learn from all prior blunders and avoid this fate. Here are five notorious breaches that started with an Insider.
    Full story
  • What Is an Insider Threat and the 5 Things You Should Know?

    by Veriato | Feb 22, 2019
    • Insider Threats
    • what is an insider threat
    • ueba
    • UBA
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Gone are the days when our greatest inklings of Insider Threats were employees who never wanted to take vacation and did everything to avoid letting others see the financial records they were maintaining. Today, Insider Threats come in a concerning variety of forms with consequences often exceeding millions of dollars. As time passes, more industries than ever before are feeling the sting of security incidents and breaches stemming from their very own trusted employees and partners.
    Full story
  • Bad Password Management by Privileged Insiders Puts the Organization at Risk

    by Veriato | Feb 06, 2019
    • Insider Threat Intelligence
    • Insider Attacks
    • Insider Threat
    Ponemon’s 2019 State of Password and Authentication Security Behaviors Report highlights how inappropriate use of privileged password can give insiders the access they need.
    Full story
  • Apple Employee Steals Thousands of Confidential Files Related to Self-Driving Car Tech

    by Veriato | Feb 01, 2019
    • Insider Threat
    • Employee Monitoring
    • data theft
    No greater tech is at the forefront of cutting-edge technology than the self-driving car. With applications in the delivery, transportation, and consumer spaces, companies today are racing to ensure they have a place in this unfolding market of autonomous driving.
    Full story
  • How to Detect a Data Breach | Insider Threat Monitoring

    by Veriato | Jan 28, 2019
    • Employee Monitoring
    • Monitoring
    • Data Breach
    • Data Leaks
    • Insider Threat
    Many actions and user behavior may be signs of a breach. Here are a few to watch out for, as well as make sure your software is monitoring.
    Full story
  • New York Gallery Accuses Former Director of Stealing Client Data and Trade Secrets

    by Veriato | Jan 25, 2019
    • Insider Attacks
    • data theft
    • Insider Threat
    A lawsuit filed this month in New York federal district court by Lehmann Maupin Gallery alleges the former employee committed data theft, deletion, and manipulation to her own financial gain.
    Full story
  • CSOs: 69% of Data Breaches are Attributed to Employee Negligence, Theft, or Sabotage

    by Veriato | Jan 24, 2019
    • cyber criminals
    • Employee Monitoring
    • Insider Attacks
    • Insider Threat
    Every company – big or small – wants to avoid a data breach. Most efforts are placed on protecting the environment from external threat actors and cybercriminal organizations attempting to get in.
    Full story
  • KPMG’s Fraud Barometer Says Most Crime is Perpetrated by Employees and Managers Already Inside Companies

    by Veriato | Jan 23, 2019
    • Employee Monitoring
    • Insider Threat
    • Fraudulent Activity
    The introspective look at the UK’s £1.2 billion in 2018 fraud cases by KPMG demonstrates the need to be mindful of insiders.
    Full story

Search Blog Posts

Filter Blog Posts