Insider Threats | SC Media

Insider Threats

Zero trust: Trust no one, verify everything

Tried-and-true security solutions like URL filtering, anti-phishing software, firewalls, and other detection and signature-based solutions are able to mitigate most cybersecurity attacks. But they operate on the erroneous assumption that anyone and anything already inside of an organization network perimeter is safe and can be trusted. This line of thinking has long been proven incorrect,…

Tesla suing self-driving startup Zoox and former employees for data theft

Tesla is accusing self-driving car startup Zoox and former employees of stealing trade secrets. The automaker is suing the start-up and the bunch claiming the employees gave Zoox Tesla’s logistics info to Zoox, while another gave Tesla’s autopilot code to Xiaopeng Motors. Two lawsuits were filed this week with one claiming employees stole “proprietary information…

Inside Security: Plan for That One Unintended Click

By Jason Lamar, Sr. Director, Product Management, Security Business Group, Cisco What’s at the top of the food chain when it comes to security breaches? People. And, no amount of security awareness training can completely protect an organization against a phishing attack. Even the most security-conscious end user can accidentally click on a suspicious link…

How to Stop the Insider Threat from Switching Off Your Security Lights

By Armaan Mahbod, manager, insider threat analyst team, Dtex Systems You’ve spent millions on security. You have the latest and smartest firewalls installed. You have deployed cutting-edge AI-powered antivirus solutions. Phishing emails are stopped cold by your expensive anti-spam and email security gateway solutions, some of the time at least. You are using a CASB…

DoD faults NSA for lax security implementations, Sophos report

A number of initiatives to strengthen security were mandated at the National Security Agency (NSA) following the leaks by Edward Snowden of 1.5 million documents, but implementation of those procedures lacked teeth, according to a report by the Department of Defense (DoD). The 61-page report from the DoD’s inspector general on the NSA’s putting into…

Next post in Network Security