Human error, credential misuse and disgruntled employees aren't the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.
To remain General Data Protection Regulation (GDPR) compliant, you will need to make sure the right people have the right access. Explore the implications of GDPR on insider threat controls.
Do you know who can see the critical data on your network? Learn how and why organizations may not be doing enough to protect sensitive information.
According to a recent insider threat report, 60 percent of risk assessments identified users who tried to bypass their employer's security measures using private or anonymous browsing.
The mean cost of an insider threat is $8.7 million, according to a recent global study, and data breaches involving negligent employees or contractors can cost organizations as much as $26 million.
The Emperor was the greatest CISO in the land. His castle was as safe as could be, and there were no insider threats to be found — or so he thought.
To deal with the daily pressures of the job, CISOs need a cybersecurity strategy that promotes cross-departmental collaboration and clear communication.
In a recent survey, security professional and executives admitted to snooping on enterprise data. How can companies improve network security for business?
Identity governance and administration process engineering remains a challenge despite growing awareness about the importance of IGA and IAM processes.
A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.