My Cybersecurity “Ah-ha” Moment

Posted By: Alan Kessler, @kessalan
06 Oct
2016
Categories : Data Security            Leave a comment            Tags: , , , ,

As some of you may be aware, October is National Cybersecurity Awareness Month.  The theme for this week, specifically, is STOP. THINK. CONNECT: The Basic Steps to Online Safety and Security. Part of this week’s focus includes examining “cybersecurity jobs and how to engage young people in pursuing careers devoted to protecting the Internet.” The weekly topic, and the entire month’s devotion to cybersecurity, compels me to consider my cybersecurity “ah-ha” moment (We’re talking pre-Edward Snowden; pre-cybersecurity “skills gap”; pre-Target). […]

Categories : Data Breach, Data Encryption            1Comments            Tags: , , , ,

It is the first day of Infosecurity Europe – Europe’s largest information security event that sees some 13,000 visitors from 70 different countries cross the tradeshow floor each year – and, it’s safe to say already that the Insider Threat is set to be one of the hottest talking points at this year’s show. This should come as little surprise since our recent report with Ovum into the scale of the problem across Europe that gave us an unsettling insight […]

Categories : Data Breach, Encryption            Leave a comment            Tags: , , ,

Organizations that have sensitive data have a perennial problem with using cloud resources …. Gaining the benefits of their use without exposing data that is required to be protected by compliance regimes, government data breach regulations or just because it is critical intellectual property. Click to Tweet: Protect high value data in AWS – @Vormetric teams with @AWSMarketplace in Security Software Free Trial amzn.to/QAhz95 If this is you, we’d really like you to “give our solution a spin” on Amazon […]

The Spending Gap – APTs and Insider Threats for Government

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
15 Apr
2014
Categories : Data Encryption, Data Security            Leave a comment            Tags: , , , ,

Just released is our latest Vormetric Insider Threat Report.  This latest report focuses on Europe, and an earlier version in September of last year detailed responses from the US.  Today, I’m taking a deeper look at the combined government data from both US and European government at a level you won’t see elsewhere. One point before I get to the results – Insider Threats aren’t just traditional insiders, people with access to sensitive data in the course of accounting, financial, […]

If you’re reading this blog, chances are good that you’ve heard of a horrid bug in OpenSSL named Heartbleed.  Rarely has a software bug caused such a ruckus in the security community.  The bug is sufficiently bad – an attacker can read random parts of the server’s memory – that an upgrade to the fixed version is an urgent matter.  To add to this, the versions of OpenSSL with the bug are very widely used – up to 2/3rds of […]

Categories : Data Security, Key Management            Leave a comment            Tags: , , , , , ,

While we’ve since learned it was a relatively unsophisticated attack, the Target data breach remains anchored in the headlines and, thanks to the more recent security breach reported at giant grocery chain Morrisons in the UK, we can’t get away from the risk posed to business by the ‘Insider Threat’. Events of the last few months have thrust the dangers of privileged user abuse into the spotlight. However, while these security incidents do vary in terms of scale and impact, […]

The Dimensions of the Insider Threat – On Premise – Cloud – Big Data

Posted By: Andy Kicklighter, @akicklighter (Twitter)
01 Apr
2014
Categories : Data Breach            Leave a comment            Tags: , , , ,

It may not be obvious, but there’s a common thread through the endless procession of data breach disclosures, and it’s the Insider Threat. Insider threats are no longer just traditional insiders with access to special information within a company (a classic is the accountant that walks off with all the cash), it now includes privileged users of all types and the compromise of accounts to gain access to sensitive data. Take a look at a couple of cases recently – […]

Top 5 Data Breach Trends for 2014

Posted By: Tina Stewart, @socialTIS
27 Mar
2014
Categories : Data Breach, Data Security            Leave a comment            Tags: , , , , ,

It’s been a while—December 2013 in fact—since my last Data Breach Round-up post and a lot has happened since. Snowden-related discussions are still dominating the news cycle, often pointing to insider threats as the most prominent issue organizations are facing today. The sheer amount of data breaches (ie. Target, Adobe, Korea Credit Bureau, Neiman Marcus) sends a signal that cybercrime will continue to rise. New security threats and regulations make the case for more transparency going forward; all signs point […]