Veriato Blog

  • U.S. Elevates Cyber Command to Combatant Status

    by Patrick Knight | Aug 30, 2017
    • cyber security
    • Cyber Command
    Whether with national security or your enterprise security, cyber security should not be marginalized on the sidelines.
    Full story
  • Additional Insight into Quantifying Insider Risk

    by Veriato | Jun 29, 2017
    • Insider Threats
    • Insider Risk
    • Insider Threat
    • Insider Threat Prevention
    • Insider Threat Detection
    Never before have there been so many platforms that let a growing number of people touch, manipulate, download, and share sensitive data.
    Full story
  • Why Trust is not Enough

    by Veriato | Jun 15, 2017
    • User Behavior Analytics
    • User Activity Monitoring
    • Insider Threats
    • Insider Threat Prevention
    • Insider Attacks
    • Insider Threat
    • Employee Monitoring
    Why high risk positions need to be monitored closely to help combat insider threats, and how User & Entity Behavior Analytics and User Activity Monitoring can help.
    Full story
  • How to Prevent Departing Employees from Pocketing Your IP

    by Veriato | May 08, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    When George, a senior salesman, started his current position 10 years ago, he brought hundreds of business cards and notes that he added to his employee’s customer management software. When he decided to leave, he thought he could take the current database with him. Not true.
    Full story
  • To cloud, or not to cloud. That is the question.

    by Stephen Voorhees, CISSP | Mar 21, 2017
    • Private Cloud
    • Security Solution
    • Cloud
    If you are thinking about storing sensitive information in the cloud, you need to be as sure of the security of that data as you would be storing it on your own infrastructure.
    Full story
  • Don’t Be Held Hostage By Ransomware. Stop The Attack Before Critical Damage Is Done.

    by Mike Tierney | Mar 06, 2017
    • Attacks
    • Malware
    • Veriato RansomSafe
    • Ransomware
    • RansomSafe
    Ransomware, a type of malware that encrypts your critical files until money is paid, continues to wreak havoc on organizations worldwide.
    Full story
  • Step 5 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 14, 2017
    • Insider Threat
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threats
    • Insider Attacks
    One of the best practices found in the Common Sense Guide to Mitigating Insider Threats is the need to develop an employee termination process that takes into account the threat a departing employee can pose.
    Full story
  • Veriato, formerly known as SpectorSoft FAQ

    by Veriato | Feb 13, 2017
    • Veriato News
    • Veriato
    • Spectorsoft
    Wondering how SpectorSoft changing to Veriato may affect you? See below for answers to questions that you may have.
    Full story

Search Blog Posts

Filter Blog Posts