Inside attack News
December 17, 2015
Strong encryption and encryption backdoors have become hot topics in the world of lawmakers and politicians, but security experts said those people don't understand the problem.
July 09, 2015
Researchers at Elastica recently discovered an Indian government agency had its employees' email addresses and passwords exposed through Google Drive.
June 03, 2015
In its 2015 Security Report, Check Point Software has found adversaries are exploiting the ease of creating unknown malware to boost the chance of a successful attack, and sandboxing adoption may be the best way to mitigate risk.
April 28, 2015
A panel discussion at RSA Conference 2015 outlined strategic methods enterprises can use to build and advocate for an insider threat program.
Inside attack Get Started
Bring yourself up to speed with our introductory content
Learn how the perimeter-based architecture failure, a professional threat economy and greater hacking penalties are driving the need for a next-generation security architecture. Continue Reading
Experts said that insider threats to health data privacy and PHI security are common, and providers should prep for HIPAA audits by OCR and other federal agencies. Continue Reading
Data loss prevention (DLP) can help any organization where the loss of sensitive information could seriously impact continued operation, explains Bill Hayes. Continue Reading
Evaluate Inside attack Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The ITPM certification can help security managers bolster insider threat programs. Here's what the certification involves and how to best prepare for it. Continue Reading
How do they know it’s really you? New behavioral technologies use data science to monitor user activity within the network. Continue Reading
The data science that reprogrammed Wall St. trading models may offer lessons for security. Continue Reading
Manage Inside attack
Learn to apply best practices and optimize your operations.
Malicious employees are usually the focus of insider threat protection efforts, but accidents and negligence are often overlooked data security threats. Continue Reading
Too many privileged accounts can result in access abuse in enterprises. Expert Mike O. Villegas discusses which account privileges should be limited to reduce security incidents. Continue Reading
Learn what emerging security threats your enterprise must now be prepared to face. Continue Reading
Problem Solve Inside attack Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As cybersecurity breaches surge, it's important that company leadership know what IT is up to. Kevin McDonald explains why IT process documentation is a must-have best practice. Continue Reading
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
Most insider attacks to enterprises are accidental, not intentional. SANS Faculty Senior Fellow Eric Cole, Ph.D., explains why security awareness training isn't enough to stop these threats. Continue Reading