From the Fall 2022 Issue

Using Behavior Profiling to Identify Insider Threats – Part 2

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

using-behavior-profiling-part-2-benack-fa22

INTRODUCTION In the previous article, we talked about the importance of identifying risky and threatening behavior from people working in an organization. But that is only half the story. The most important part of keeping an organization safe from insiders is detecting and countering threatening behavior. Detection and countering of insider threats requires both a … Read more

From the Summer 2022 Issue

Using Behavior Profiling to Identify Insider Threats – Part 1

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

Benack-Su22-feature

INTRODUCTION Organizations often spend significant time, effort and resources protecting their data and systems from external threats such as hackers, foreign spies, hacktivists, and cybercriminals. Internal threats, often called “insider threats”, are often ignored because they are much more challenging for an organization to address. One valuable tool for managing risk around insider threats is … Read more

From the Spring 2022 Issue

Human Risk in the Flow of Work

Author(s):

Travis Good, MD, Co-Founder and CEO, Haekka

The way in which work is performed has changed dramatically over the last 20 years. Digital transformation, coupled with the transition to remote work, has only accelerated over the last several years with the backdrop of Covid. Organizations today, large and small, have the herculean mandate of securing their biggest liability — remote workers and … Read more

From the Fall 2020 Issue

Holistic Cybersecurity: The Human Element

Author(s):

Umang Doshi, Managing Partner, Business Development – Cybersecurity Strategy

Holistic Security

Digital technological advancements continue to occur at an unprecedented pace and, not coincidentally, the need to be cyber-secure has become more crucial. With each new application and device that otherwise seamlessly integrates into our personal and professional lives, so too does the opportunity for cybercriminals to infiltrate them. The extent of connectivity that we have … Read more

Mental Health and Cybersecurity

Author(s):

Frankie Wallace, ,

Mental health cybersecurity, girl sad, phone bad, girl on phone

Strong cybersecurity is vital, and the cybersecurity industry is evolving at a rapid pace. Still, even as more and more companies embrace cybersecurity professionals, a key aspect of this field remains overlooked: mental health. You might ask yourself what cybersecurity has to do with mental health. While acts like cyberbullying can obviously lead to negative … Read more

Employee Reporting

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Employee Reporting boss yelling at employee business attire

As we have talked about before, insider threats are responsible for around 43% of all data breaches. Among these breaches, 21% of them are intentional, malicious, and premeditated. As more small businesses come under attack, anxiety within the work place is at an all-time high. When facing the threat landscape, it is important to remember … Read more

6 Tips for Getting the Most out of Cybersecurity Conferences

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Man speaking at a conference on cybersecurity conferences

An important part of cybersecurity is plugging into the surrounding community. Connectivity is a major component of spreading new innovations. Many security professionals enjoy attending conferences for this very reason. But when attending cybersecurity conferences, it is important to get the most out of your interactions. Therefore, here are some tips to make sure you … Read more

From the Summer 2016 Issue

Cyber Hygiene: Not Just a Buzzword

Author(s):

Evan Dornbush, Co-Founder and CEO, Point3 Security, Inc.

On That Day, Everything Changed When Target Corporation was breached in 2013, leading to the loss of over 110 million customer records, it was following industry best practices to ensure that corporate assets were properly protected. It employed internal security practitioners. It outsourced niche services such as penetration testing and malware analysis to specialists. Its … Read more