insider threat
It’s official, corporate passwords are cheap
Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …
User activity monitoring crucial to minimizing security risks
In this ever evolving threat landscape, willing or unwitting insiders often play a key role in security compromises of organizations. It used to be that an …
Real-time session monitoring by Cyber-Ark
Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …
Employees are deliberately disabling security controls
Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …
Programmer steals US government software source code
A Chinese computer programmer has been arrested in New York for having allegedly copied and stolen the source code of software developed by the US Treasury Department, …
Preventing Good People From Doing Bad Things
As the number of known security breaches seemingly rises exponentially with every passing day, business managers and the general public are becoming increasingly aware of a …
Hacks of Chinese sites either inside jobs or faked
Last week’s news that hacks of a number of high-profile sites resulted in the compromise of personal and financial information of over 100 million Chinese Internet users …
A new perspective on the insider threat
When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …
The risks of unauthorized access
HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …
Hiding messages in VoIP packets
A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …
Motorola attempted to crush competitor via “Chinese spy ring” allegations
Four years ago a software engineer that worked for Motorola was arrested by U.S. Customs agents as she was trying to board a plane heading for China. Hanjuan Jin was carrying …
Information theft still a serious threat to global business
Fraud remains predominantly an inside job, according to the Kroll Annual Global Fraud Report. The study shows that 60 percent of frauds are committed by insiders, up from 55 …