Whether a disgruntled employee intentionally steals data or an unknowing co-worker accidentally releases information, the insider threat is real.
The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
Cloud applications have heightened the risks to corporate data posed by insiders with authorized access to enterprise systems, a recent survey shows.
According to a recent report, 95 percent of successful security attacks are caused by human error, making improved employee education is vital.
The results of IBM's "2014 Cyber Security Intelligence Index" show that the majority of organizations are more vulnerable than they think.
Protecting against insider threats and security breaches is not always easy. The infamous NSA data leaks and various well-publicized thefts of corporate resources have prompted executives to consider how best to protect their crown jewels from...
The infamous NSA security breach reminds us once again of the immense damage that can be caused by a single privileged user with an agenda. Privileged users, with their unlimited access to system and network resources, can access and leak all types...