Insider Threat

The True Price Tag of Insider Threats: Findings from the New 2016 Cost of Insider Threats Report

Insider threat is a security issue that’s constantly floating in limbo. It’s significant enough to net some discussion, sure. But for a lot of organizations, it just isn’t a pressing priority. That is, it isn’t until an enterprise experiences an incident themselves. Then it becomes  top-of-mind for [...]

By | September 14th, 2016|Dtex, Insider Threat|0 Comments

Top 3 Insider Threat Takeaways From Our Talk with Security Expert Peter Erceg

Peter Erceg managed security for one of the largest mobile operators in the United Kingdom. He sat down with Dtex CEO Mohan Koo to talk about what it took to implement in an insider threat program in Europe, taking into consideration privacy laws, employee culture, [...]

By | August 17th, 2016|Insider Threat, Management|0 Comments

The Insider Threat: from Silicon Valley to the Czech Republic

Every few days we see another example of the insider threat at work. Sometimes, it’s still shocking to see how widespread this issue is! Stories cross our desks from all over the world and from all kinds of industries. Take this one, for example: a telecom employee [...]

By | June 23rd, 2016|Insider Threat|0 Comments

TeamViewer Hacked? How We Mitigated a Potential Security Risk in Minutes

No security professional likes to wake up in the morning to hear the news that a commonly-used development tool has been compromised. But that’s exactly the situation that Dtex found ourselves in last week, when major news outlets started reporting that Teamviewer, a popular remote-access software, had [...]

By | June 6th, 2016|Insider Threat|0 Comments

Can You Believe How Easily These Scientists Stole Data? 3 Insider Threat Insights

You’ve probably already heard about the latest news in the security world. Two scientists have been charged with stealing valuable intellectual property from their employer, British pharmaceutical giant GlaxoSmithKline. More specifically, the scientists -- along with three other co-conspirators outside of the company -- stand accused of [...]

By | February 10th, 2016|Insider Threat|0 Comments

The Most Dangerous Call Center Security Threat: The Why and How of Stopping the Insider Threat

From a security standpoint, call centers are one of the riskiest areas of the enterprise. Like any branch of an organization, they're susceptible to malware, APT, and other security threats. But there’s one security concern that they need to pay extra special attention to: the insider threat. Call [...]

By | January 27th, 2016|Insider Threat, Management|0 Comments

What Your User Behavior Analytics Initiative is Missing

The value of User Behavior Analytics is without question -- they can give you a whole new insight into user activity, which is critical when identifying anomalies and compromised credentials. But it’s very possible that you won’t get the value you should be from your UBA project, [...]

By | October 23rd, 2015|Insider Threat|0 Comments

The Insider Threat Kill Chain: 5 Steps to Watch Out For

As a company that’s been fighting the insider threat for more than 15 years, we’ve been in the game long enough to identify distinctive trends in insider behavior. These are independent of company size or industry, and, in general, are surprisingly consistent. One of the most helpful [...]

By | October 8th, 2015|Insider Threat|0 Comments

Oops! The Risk of the Unintentional Insider Threat

When most people think of the insider threat, they think of that picture-perfect stock image of a man in a hoodie hunched menacingly over his laptop. Sure, there are likely plenty of hoodie-wearing malicious cyber criminals out there, but realistically, most insider threat looks very different. In [...]

By | August 13th, 2015|Insider Threat|0 Comments

Is $150 Enough to Buy Your Employees?

We were pretty enthralled by last week’s article over at The Register, which covered a survey that claimed that one third of employees would sell sensitive company information -- including IP, financial records, and customer credit card details -- for the right amount of money. But that’s [...]

By | August 5th, 2015|Insider Threat|0 Comments