Veriato Blog

  • Step 5 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 14, 2017
    • Insider Threat
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threats
    • Insider Attacks
    One of the best practices found in the Common Sense Guide to Mitigating Insider Threats is the need to develop an employee termination process that takes into account the threat a departing employee can pose.
    Full story
  • Step 4 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 11, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    At a very high level, the risk scores equate to how much the organization sees the position, department, or individual in terms of potential exposure.
    Full story
  • Step 3 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 08, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    In order to establish controls that allow the organization to properly detect insider risk, you must first know where you should be looking. Each position within your company has a relative level of risk associated with it.
    Full story
  • Step 2 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 05, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    Insider risk begins the moment you grant access. What’s required on an employee’s first day is to present them with a CIPA.
    Full story
  • Step 1 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 02, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    • Insider Attacks
    Risk around company data normally falls to someone within IT, the security team, or to the CISO, as these individuals will play a crucial role in quantifying and addressing insider risk.
    Full story
  • Intro to Quantifying Insider Risk

    by Mike Tierney | Jan 31, 2017
    • Insider Threat Prevention
    • Insider Threat
    • Insider Threats
    • Insider Threat Detection
    • Insider Attacks
    Risk is one of those subjective concepts that usually fall into vague categories like “low” and “high” – which has very little meaning on its own, and only has value when you tie those categories to actions .
    Full story
  • Quantifying the risk of an insider data leak

    by Mike Tierney | Sep 08, 2016
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Veriato Recon
    • Veriato
    • Risk Scoring
    One of the challenges associated with effectively combating the threat of insider data leaks, stems from a lack of understanding of the risk resident within the perimeter.
    Full story
  • 4 Steps to Reduce the Risk of Malicious Insider Activity

    by User Not Found | Jul 01, 2016
    • Insider Threat
    • User Behavior Analytics
    • User Activity Monitoring
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Attacks
    • Employee Monitoring
    • Data Protection
    Improve your organizational ability to detect insider threats before they become insider attacks, react quickly and with confidence to potential (or actual) problems.
    Full story