Employee fraud and abuse cost companies roughly 5% of their annual revenues on average, but small companies suffer disproportionately higher losses due to their trusting cultures and the relatively broad
Insider Threat Maturity Framework: An Analysis
The Insider Threat Program Maturity Framework, released by the National Insider Threat Task Force (NITTF) earlier this month, is designed to enhance the 2012 National Insider Threat Policy and Minimum
Haystax Product Update: Functionality Enhancements
Haystax risk-mitigation software products support missions as dissimilar as critical infrastructure protection and insider threat mitigation. At the core of these diverse applications, though, is a single analytics platform designed
‘Last-Mile’ Workflows for Tighter SOC Responses
How many times have buyers of insider threat detection and response solutions heard this vendor pitch? “We bring your user data into our system so your security operations center analysts
Gleaning Deeper Insights from Badge Data – Part 2
We described in Part 1 of this post why access-badge data is a valuable source of evidence as to whether an employee, contractor, vendor or customer poses a risk to
Gleaning Deeper Insights from Badge Data – Part 1
Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at
Personal Trust Scoring Gains Acceptance
The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal
Get the Data You Need
Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for