Veriato Blog

  • A Not Exactly Up-Lyfting Incident

    by Mike Tierney | Oct 28, 2015
    • Data Leaks
    • Security Solution
    • IP Theft
    If you haven't seen the news about Lyft and its former COO, check out the great write-up by Ryan Lawler over at TechCrunch.com.
    Full story
  • The barbarians are through the gate.

    by Mike Tierney | Oct 02, 2015
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat
    Insider threats are a big topic - in the news and here at Veriato. We give webinars advising companies on how to reduce their risk of an insider incident, have published articles on the topic, and offer solutions that improve insider threat detection and facilitate insider incident response.
    Full story
  • One million six hundred ninety-one thousand reasons to look inside

    by Mike Tierney | Sep 28, 2015
    • Insider Threats
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    62% of security professionals who took part in the survey believe insider attacks have become more frequent in the last 12 months.
    Full story
  • The data says it's the data

    by Mike Tierney | Sep 28, 2015
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    63% of survey respondents are most concerned with data leaks stemming from insider attacks.
    Full story
  • Can you keep a secret?

    by Mike Tierney | Sep 02, 2015
    • Protect Data
    • Security Solution
    According to USPTO.gov, trade secrets consist of information and can include formulas, patterns, compilations, programs, devices, methods, techniques or processes.
    Full story
  • Read this. Pick yourself up off the floor. Then Trust, but Verify.

    by Mike Tierney | Aug 04, 2015
    • UBA
    • User Behavior Analytics
    • Behavior Analytics
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato Recon
    Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software, I read a lot about specific insider attacks.
    Full story
  • Dealing With Insider Risk Starts Before They're An Insider

    by Mike Tierney | Jul 29, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Does your company have a 'one size fits all' approach to screening perspective hires?
    Full story
  • The disgruntled employee insider threat

    by Mike Tierney | Jul 17, 2015
    • Insider Attacks
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Veriato Recon
    Computerworld UK has a great article out on the insider data breach at Morrisons supermarkets in the United Kingdom.
    Full story