Quantcast
Channel: Insider Threats - Infoworld
Browsing all 29 articles
Browse latest View live

Top cyber security concerns: Malicious code, employees run amok

When 3,300 information-technology professionals were asked about cyber security, they said malicious code attacks accounted for the main type of cyber attack their organizations suffered during the...

View Article



Why physical security matters, even in the cloud

At the Business of Cloud Computing Conference, I caught a presentation by Marlin Pohlman, who noted that No. 3 on the Cloud Security Alliance's "Top Threats to Cloud Computing" list is malicious...

View Article

By the numbers: The impact of data breaches

Dek:  Websense 'Security Pros and Cons' survey of 1,000 IT managers confirms that data breaches are widespread. Here's a look at how organizations are responding. Source: Network World No

View Article

Most fraud is an inside job, says survey

Fraud cost organizations 2.1 percent of earnings in the past 12 months, which is equivalent to a week of revenues over the course of a year, according to the Kroll Annual Global Fraud Report, a recent...

View Article

5 security breakthroughs promise to thwart threats

For the past 25 years, a war has waged between malicious programmers and the researchers trying to make computing safe for the enterprise. The battle has shown no signs of subsiding — once a new...

View Article


Secondhand networks and back-alley firmware

When it's time to update firmware on, say, a router or a switch, the vast majority of folks head to the vendor site and grab whatever version they need, easy-peasy. But a large and growing number of...

View Article

Architectural rule No. 1: Segregate everything

Enterprise IT infrastructures now face such an explosion of applications, devices, and data that just running in place is hard enough. Nobody seems to have the time or resources to design new systems...

View Article

IBM software eases role-based security operations

IBM this week announced an identity-management analytics tool that eases what can be a tedious job for information-technology managers -- defining roles for employees in order to establish policy-based...

View Article


Federal Reserve contractor charged with source code theft

A U.S. Federal Reserve contractor has been charged with copying the source code of software that keeps track of large exchanges of money between U.S. government agencies.Bo Zhang, who lives in Queens,...

View Article


Mobile data privacy is terra incognita to users and developers

President Obama's move Thursday to establish a so-called Privacy Bill of Rights for the Internet can be seen as the consolidation of decade-long efforts by disparate groups to improve privacy...

View Article

Most organizations take months -- or years -- to discover a breach

Over 90 percent of data breaches are the result of external attacks and almost 60 percent of organizations discovered them months or years later, Verizon said in a report released at the RSA security...

View Article

Image may be NSFW.
Clik here to view.

6 tips for secure cloud shopping

Cloud service providers are taking advantage of buyer ignorance about cloud security, pushing tantalizingly low-cost service contracts that don't meet prospective customers' security needs.

View Article

Will the real security threat please stand up?

This week saw two somewhat conflicting reports on our current state of insecurity. The news ain't good, but it's better than you might expect.First up, Verizon released its eighth annual Data Breach...

View Article


Download the Insider Threat Deep Dive Report

Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other...

View Article

Security swallows the CEO

In an era when security breaches hog the headlines and companies scramble to protect corporate data, in some ways I'm grateful to work for a CEO who emphasizes the need for security. But there are...

View Article


Cisco's ugly bait and switch

You may have heard about Cisco's shenanigans last week, in which an automatic firmware update for several models of the company's Linksys home wireless routers forced users to create and log into a...

View Article

Slimeball boss learns you don't mess with IT

Honesty is always the best policy -- unless, it seems, you work in the upper echelons of the corporate world, in which case all too often honesty becomes optional based on cost analysis and the impact...

View Article


Secure or not? 10 spot checks will tell you

I don't know about you, but I can tell in about a minute how much someone I've just met knows about computers, networks, and security. It's in what they say, how they respond, and what they think about...

View Article

Image may be NSFW.
Clik here to view.

Swiss intelligence insider may have swiped U.S. counterterrorism data

View Article

5 places your data goes to hide

"Information wants to be free" is a gross understatement.Enterprises blanket their systems with security in the attempt to saturate every data repository with protection. Organizations affirm the logic...

View Article
Browsing all 29 articles
Browse latest View live




Latest Images