Category: Insider Threat

A look inside the 2015 European Insider Threat Report

Posted By: Tina Stewart, @socialTIS
17 Jun
2015
Categories : Insider Threat            Leave a comment           

Today marks the release of our latest insider threat report in Europe, investigating how IT Decision Makers in the region are evaluating and addressing the risks posed by this specific threat vector. This is the third time we have conducted European research into this area (following research released in March 2014 and in April 2013), with the latest findings suggesting that organizations are still struggling to protect their data. One of the primary reasons that organizations feel vulnerable is because […]

When Healthcare Data Gets Exposed It Comes at a Premium

Posted By: Tina Stewart, @socialTIS
13 Apr
2015
Categories : Insider Threat            Leave a comment           

This year, with our 2015 Insider Threat Report, we’ve also been releasing extended information for target verticals and markets.  Today we released the Healthcare results from the study, and earlier released financial and retail, cloud and big data and Japan and ASEAN results set.  The release of the healthcare results seems especially timely with recent breaches from Anthem and Premera in mind. ClickToTweet: Healthcare’s most dangerous insider – Privileged Users(62%) @SocialTIS #2015InsiderThreat http://bit.ly/1OqSR44 Healthcare data has become one of the […]

U.K. Focus on Cloud Risks to Data

Posted By: Darren Harmer
06 Apr
2015
Categories : Data Security, Insider Threat            Leave a comment           

Last week, we announced the Cloud and Big Data edition of our 2015 Insider Threat report. Extending earlier findings in the global report with details of what a compromise of cloud platforms and big data environments could be like, it made for some interesting reading. ClickToTweet: UK Cloud Use – 54% keep sensitive data in the cloud http://tinyurl.com/k9hk4y7 Countless studies have shown us that cloud computing has the potential to make businesses more responsive than ever – imparting the economic […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr
2015

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Japan and ASEAN Insider Threat Report – A Study in Contrasts

Posted By: Andy Kicklighter, @akicklighter (Twitter)
31 Mar
2015
Categories : Data Security, Insider Threat            Leave a comment           

We issued today our 2015 Vormetric Insider Threat Report – Japan and ASEAN Edition, and the results have been a study in contrasts. Results for ASEAN are the closest match from our sample set to those of U.S. respondents, while those from Japan are often closer to the results from our first Vormetric Insider Threat Report in 2013. ClickToTweet: Insider Threats are different from a few years ago – with the addition of service providers and contractors to manage internal […]

Categories : Data Security, Insider Threat            Leave a comment           

It’s no surprise that every company’s data is vulnerable to hackers. As a result, implementing strong data security practices should be an obvious priority for enterprises. According to our 2015 Insider Threat Report, data breach protection has replaced meeting compliance standards as the number one security priority for companies. Organizations are going in the right direction with over 40 percent reporting that they have experienced a data breach in the past year, this reprioritization couldn’t come at a better time. <ClickToTweet>Retail […]

A GUIDE TO THE CIO’S TOOLBOX

Posted By: Alan Kessler, @kessalan
03 Feb
2015
Categories : Cloud Computing, Cloud Security, Data Breach, Insider Threat, Key Management, Privileged User            Leave a comment           

In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. <ClickToTweet>: IT Security Improvement – A Guide to the CIO’s Toolbox from @kessalan #DefenderOfData http://bit.ly/1yz8Hjy Data-at-rest is susceptible […]

Top 3 surprising results from the 2015 Vormetric Insider Threat Report

Posted By: Andy Kicklighter, @akicklighter (Twitter)
30 Jan
2015
Categories : Insider Threat            Leave a comment           

We had a couple of surprising findings come up in the data for the 2015 Vormetric Insider Threat report this year and I thought I’d highlight my top three here. 1 – People aren’t sure what solutions they need to solve the problem. Insider threats aren’t just traditional employees with access to financial data, critical IP or secrets. They now include a host of partners and service provider employees that also have access to enterprise networks, cloud and SaaS resources. […]

22 Jan
2015
Categories : Data Breach, Data Protection, Data Security, Insider Threat, Privileged User            Leave a comment           

While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of course, there can be no denying that the breadth and depth of private and public sector breaches in the past few years that have resulted from trusted insiders turning rogue or being compromised by perpetrators of […]

Categories : Access Control, Big Data, Cloud Security, Data Breach, Data Security, Insider Threat            Leave a comment           

While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking alongside using physical force. Today we issued our 2015 Vormetric Insider Threat report. Coming off of the Sony breach and Obama’s State of the Union address, we can’t think of a better time to […]