Policy & Practice

The Insider Threat Program Maturity Framework, released by the National Insider Threat Task Force (NITTF) earlier this month, is designed to enhance the 2012 National Insider Threat Policy and Minimum…

security operations center SOC

How many times have buyers of insider threat detection and response solutions heard this vendor pitch? “We bring your user data into our system so your security operations center analysts…

cybersecurity

Today is the first day of Cybersecurity Awareness Month, a fitting occasion to reexamine some key principles that security organizations should keep in mind as they establish a cyber-risk mitigation…

Insider Threat, Security Analytics, trust score

The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal…

Cyber security

Commercial enterprises are increasingly turning to an integrated risk management (IRM) approach to security, rather than simply trying to meet governance, risk management and compliance (GRC) standards. The shift is…

school safety

We all know that communities across the country expect and deserve a school environment where children can learn and develop while feeling safe. Today’s challenge is figuring out what we…

Is the European Union’s General Data Protection Regulation (GDPR) a game-changer for security analytics? The regulation enters into force on May 25, and in this regard its 99 articles and…

insider threat

Companies across a wide spectrum of industries continue to wrestle with how to implement a well-designed insider threat program. The US government has provided guidelines that help but, as we’ve…

insider threat

Is Lord Varys, the enigmatic eunuch, a threat to Daenerys Targaryen’s army? As any Game of Thrones fan knows, Varys is currently an advisor to Daenerys. With the help of…