Keeping an Eye Out for Positive Risk
We commonly think about risks having negative consequences. With each month bringing new cybersecurity threats, breaches, and vulnerabilities, sound risk management practices are necessary….
Read MoreWe commonly think about risks having negative consequences. With each month bringing new cybersecurity threats, breaches, and vulnerabilities, sound risk management practices are necessary….
Read MoreMost organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems….
Read MoreIn previous posts of our series analyzing and summarizing insider incidents across multiple sectors, we presented up-to-date statistics from the CERT National Insider Threat Center (NITC)….
Read MoreSeptember 2019 has been declared National Insider Threat Awareness Month by the National Insider Threat Task Force, the National Counterintelligence and Security Center….
Read MoreThe best way to learn is by doing. But when it comes to penetration testing, learners risk legal implications and bad habits if they don’t follow ethical, safe procedures….
Read MoreTuning detective controls is a key component of implementing and operating an insider threat program, and one we have seen many organizations struggle with….
Read MoreIn the United States, legal cases may be tried in criminal court or civil court. According to data in the CERT National Insider Threat Center (NITC) incident corpus, the type of court makes a big difference….
Read MoreIn honor of Cybersecurity Awareness Month, I decided to put fingers to keys and share some basic practices that every organization should consider for their cyber hygiene initiatives….
Read MoreOne of our goals at the CERT National Insider Threat Center (NITC) is to monitor the shifting landscape of insider threat to identify tools and techniques….
Read MorePhishing attacks target human, rather than technical, vulnerabilities. Some organizations, companies, government agencies, educational institutions, and individuals put on blinders….
Read MoreHaving trouble clearly stating the scope of your insider threat program? Struggling with measuring the program’s effectiveness? Failing to provide actionable intelligence to the program stakeholders?…
Read MoreBecause of the scope and scale of the insider threat, the SEI recommends that organizations adopt a use-case-based approach to insider risk mitigation….
Read More