insider threat

Was your data breach an inside job?
Kaspersky Lab revealed the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents …

The transformative impact of cloud adoption
Despite the average company using 1,427 cloud services to upload an average of 18.5 TB of data to cloud applications each month, less than 9 percent of cloud providers are …

Fraudsters accessed Three UK customer database with authorised credentials
Three UK, a telecom and ISP operating in the United Kingdom, has suffered a data breach. According to Three’s status report on the investigation, the attackers were able …

The decline of cyber resilience: Organizations unprepared to face attacks
Only 32 percent of IT and security professionals say their organisation has a high level of cyber resilience – down slightly from 35 percent in 2015, according to a global …

Tesco Bank hack shows that attackers continue to follow easy money
What happens when nearly 9,000 accounts at a financial institution experience fraudulent activity and clients have nearly £2.5 million stolen? People notice. The bank notices …

1 in 3 organizations have experienced an insider attack in the last year
A new Bitglass report on insider threats in the enterprise found that, in a third of organizations surveyed, careless or malicious user behavior resulted in data leakage, up …

The hidden cost of the insider threat
Organizations are spending an average of $4.3 million annually to mitigate, address, and resolve insider-related incidents – with that spend surpassing $17 million annually in …

Real damage done by malicious, careless and compromised insiders
A recent OnePoll survey has revealed some surprising results regarding malicious insiders. 36 percent of surveyed companies experienced security incidents involving malicious …

Can Big Data analytics strengthen your security posture?
The Ponemon Institute released the results of its first report focused on how big data analytics are being used by organizations to strengthen cybersecurity postures. Their …

Cybercriminals select insiders to attack telecom providers
Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also …

Privileged user abuse and the insider threat
Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …

Organizations still unprepared for malicious insiders
Organizations globally believe they are their own worst enemy when it comes to cybersecurity, with 45 percent saying they are ill-equipped to cope with the threat of malicious …
Featured news
Resources
Don't miss
- Why global tensions are a cybersecurity problem for every business
- How to build an effective cybersecurity simulation
- Generative AI Is reshaping financial fraud. Can security keep up?
- CISA reveals new malware variant used on compromised Ivanti Connect Secure devices
- Windows 11 quick machine recovery: Restoring devices with boot issues