In Part 1 of this post we explored the basic characteristics of user activity monitoring (UAM), security information and event management (SIEM), user and entity behavioral analytics (UEBA) and artificial
Two Essential Tools for Successful Insider Risk Mitigation – Part 1
A common question among companies seeking to mitigate the risk of an insider attack is: “What tools should we buy for our mitigation program to be successful?” Our view is
Counting the Costs of an Insider Attack
Companies can save anywhere from $100,000 to $2 million by proactively preventing a data breach or other insider attack, according to a recent industry survey. The survey, published in early
Can Employee Wellness Programs Help Avert an Insider Attack?
Many of us spend more of our waking moments working than any other single activity. Which means our bosses probably know more about our routines, attitudes and even financial health
Self-Driving Cars and Insider Risk
Research into autonomous cars is kicking into high gear. Companies like Google’s Waymo, Argo AI, Uber ATG, Tesla, GM Cruise and many others have made lots of progress, but they
School Domain Awareness Defined
✓ School safety assessments conducted on-site using mobile devices. ✓ A detailed catalog of campus data showing everything from floor plans to key contacts to reunification protocols. ✓ Instantaneous alerts
A Risk-Based, Data-Driven Approach to Continuous Vetting
A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly available data sources
Multiple-Persona Disorder: Understanding All Your Insider Threats
Enterprises with insider threat mitigation programs often focus primarily on detecting and responding to malicious actors. At best, they may subdivide their threats into either malicious or negligent personas. These