Read more about insider threat
Bookmark and Share
  • SANS revamps its Memory Analysis Course

    02.05.2014

    To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete revamp of its SANS FOR526: Memory Analysis In-Depth course.

  • Half of IT pros make undocumented changes to IT systems

    15.04.2014

    57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations donít have formal IT change management controls in place.

  • Businesses take little action to mitigate the insider threat

    15.04.2014

    While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators.

  • The insider threat is growing

    03.04.2014

    Vormetric and Ovum surveyed more than 500 IT decision-makers at mid and large size organizations in the UK, France and Germany.

  • 800M exposed records make 2013 record year for data breaches

    19.02.2014

    Despite oft repeated claims that the insider threat is the one organizations should be looking out for, the numbers and statistics related to 2013 data breaches show that risk is much smaller than the one related to attacks coming from the outside.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //