Veriato Blog

  • One million six hundred ninety-one thousand reasons to look inside

    by Mike Tierney | Sep 28, 2015
    • Insider Threats
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    62% of security professionals who took part in the survey believe insider attacks have become more frequent in the last 12 months.
    Full story
  • The data says it's the data

    by Mike Tierney | Sep 28, 2015
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    63% of survey respondents are most concerned with data leaks stemming from insider attacks.
    Full story
  • Can you keep a secret?

    by Mike Tierney | Sep 02, 2015
    • Protect Data
    • Security Solution
    According to USPTO.gov, trade secrets consist of information and can include formulas, patterns, compilations, programs, devices, methods, techniques or processes.
    Full story
  • Read this. Pick yourself up off the floor. Then Trust, but Verify.

    by Mike Tierney | Aug 04, 2015
    • UBA
    • User Behavior Analytics
    • Behavior Analytics
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato Recon
    Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software, I read a lot about specific insider attacks.
    Full story
  • Dealing With Insider Risk Starts Before They're An Insider

    by Mike Tierney | Jul 29, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Does your company have a 'one size fits all' approach to screening perspective hires?
    Full story
  • The disgruntled employee insider threat

    by Mike Tierney | Jul 17, 2015
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Veriato Recon
    Computerworld UK has a great article out on the insider data breach at Morrisons supermarkets in the United Kingdom.
    Full story
  • Are we counting on a Maginot Line?

    by Mike Tierney | Jun 15, 2015
    • Employee Monitoring
    • Security Solution
    • Data Leaks
    • Data Protection
    A whole lot of time and money gets spent preventing acts or behaviors from happening.
    Full story
  • Attack the problem before the problem attacks you

    by Mike Tierney | Jun 14, 2015
    • Behavior Analytics
    • User Behavior Analytics
    • UBA
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato 360
    In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users.
    Full story