Categories : Insider Threat            Leave a comment           

We had a couple of surprising findings come up in the data for the 2015 Vormetric Insider Threat report this year and I thought I’d highlight my top three here. 1 – People aren’t sure what solutions they need to solve the problem. Insider threats aren’t just traditional employees with access to financial data, critical IP or secrets. They now include a host of partners and service provider employees that also have access to enterprise networks, cloud and SaaS resources. […]

Categories : Data Security            Leave a comment           

We’ve just released our third annual Vormetric Insider Threat Report – Global Edition, and I thought I’d share with you a roll up of what I found most significant for cloud providers from the data. We’re especially happy with the results this year – polling was provided by Harris Poll, an especially strong global survey organization, with results from 818 IT Decision makers in both US and Global enterprises.  The author for the report is once again Ovum Analyst Andrew […]

22 Jan
2015
Categories : Data Breach, Data Protection, Data Security, Insider Threat, Privileged User            Leave a comment           

While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of course, there can be no denying that the breadth and depth of private and public sector breaches in the past few years that have resulted from trusted insiders turning rogue or being compromised by perpetrators of […]

Categories : access control, Big Data, Cloud Security, Data Breach, Data Security, Insider Threat            Leave a comment           

While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking alongside using physical force. Today we issued our 2015 Vormetric Insider Threat report. Coming off of the Sony breach and Obama’s State of the Union address, we can’t think of a better time to […]

13 Jan
2015
Categories : Data Security            Leave a comment           

Now that we’re past the New Year, it’s time to learn from what happened in 2013 and 2014, especially when it comes to IT Security. One of those things we in IT Security should learn, is that there has been a strong insider related component in the vast majority of the large breaches that have happened this last year. <ClickToTweet>: What we learned about Insider Threats in 2013 and 2014 @akicklighter #DefenderOfData http://bit.ly/1DDWXmm If it wasn’t a traditional insider, as […]

Categories : Data Security            Leave a comment           

What threats are you trying to mitigate with full disk encryption? For a laptop that is moved around from office to home or out on a business trip full disk encryption should be standard. You need to protect that asset in the event of theft or loss of the device. It’s a great physical security. When properly implemented full disk encryption will render any information stored on that device useless. That’s great for a laptop, but what about your data […]

05 Jan
2015
Categories : access control, APT, Cloud Security, Data Breach, Data Breach Disclosure, Data Security, Encryption            Leave a comment           

What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions. <ClickToTweet>: Insider Threats – More than just malicious insiders http://bit.ly/1rZpr5L #DefenderOfData But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be […]

18 Dec
2014
Categories : Data Security            Leave a comment           

The slogan “Internet of Things (IoT) X Big Data = Unprecedented Value!” caught my attention as I was listening to a presentation from Intel Corporation. The scale of the IoT disruption was described in terms of things, data and value: 50 billion devices are expected to connect to the Internet by 2016. As recently as 2013 this was 0.5 Billion These devices will generate 35 Zetabytes of data! And can create an estimated value of $2 to $6 trillion in […]

I try to keep on top of the news, particularly as it relates to the nature and severity of cyber attacks taking place. Sadly, there’s been no shortage of reading material lately. Last month, there were reports on breaches at Kmart and Dairy Queen (my family loves Blizzards). Updates then came out about a massive breach at Home Depot. Then more recently, there’s been the spate of nation-state attacks on the USPS, National Oceanic and Atmospheric Administration (NOAA), Sony Entertainment […]

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security […]