Is your thermostat spying on you? Cyberthreats and the Internet of Things
The Internet of Things opens up a whole new world of interactions, but raises the specter of a security nightmare. Classic security solutions fail when faced with multitudes of devices running embedded software.
Do you know how to protect your key assets?
Security breaches continued making headlines in recent months, and while hackers still go after credit card data, the trends goes towards richer data records and exploiting various key assets inside an organization. As a consequence,...
Detecting the Insider Threat – how to find the needle in a haystack?
Insider threats are complex and their prevention involves the information security, legal and human resources (HR) departments of an organization. While legal and HR usually deal with the threat _after_ the fact, what can information...
Malicious insider psychology – when the personal bubble bursts
External and mental pressure, an opportunity to steal confidential information and rationalization of the potential theft are the factors that contribute for an insider to turn against his employer. While these three factors are...
Malicious insider psychology – when pressure builds up in the Fraud Triangle
Some of the insider threat incidents are caused by the negligence or even naiveté of insiders enabling an outside attack, while others are planned malicious actions of an insiders that involve stealing confidential company information...
Insider Threats in critical US Infrastructure – 'Let me blow you up!'
A scary 70 percent of critical infrastructure organization suffered breaches in the last year, including water, oil and gas, and electric utilities. An almost equally high number of 64 percent anticipate one or more serious attacks in...
Insider Threats – the myth of the black swan
Most companies think of insider threats as ‘black swan’ events – highly visible, but extremely rare and hard-to-predict. If a threat is such a rare event, after taking some precautions, should companies really care and act upon the...
Insider Threats – how they affect US companies
In the second post of the Insider Threat series, we looked at basic definitions of insider threat incidents and their impact on organizations. Now we will have a closer look at how malicious insider threat actions affect companies in...
Insider Threats – is your organization safe?
In the previous post of this blog series, we discussed highly publicized whistleblower cases such as Chelsea Manning and Edward Snowden. While government agencies are ramping up their protections of data and infrastructure against...
Insiders – threat or blessing?
Insiders leaking secret government information have had their impact on public opinion in recent years. Edward Snowden received the alternative Nobel prize in September 2014. This might be great, if you look at it from the perspective...
Top Blog Posts