The Defense Digital Service’s automated investigations tool turns to the dark side of insider threat hunting and gets rebranded to match. An automated background investigations prototype...
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) released an Insider Risk Mitigation Self-Assessment Tool today, which assists public and private sector organizations in assessing their vulnerability to an...
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a new tool that allows public and private sector organizations to assess their vulnerability to insider...
Agencies must implement a comprehensive user monitoring program that effectively combines the human intelligence and artificial intelligence. Earlier this year, the Government Accountability Office revealed that...
The 2021 Insider Threat Virtual Conference, hosted jointly by the Defense Counterintelligence Security Agency and the Office of the Under Secretary of Defense for Intelligence and...
The Defense Department office charged with investigating potential insider threats wants to use social media to add context to allegations. The Defense Counterintelligence and Security Agency...
Proofpoint, Inc. unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk—vulnerability, attacks, and privilege—and how the extraordinary events...
Half (49%) of U.S. WFH employees say they continue to use their personal laptop or computer as they work remotely, according to Morphisec’s 2021 WFH Employee Cybersecurity Threat...
Dr. Bobby Blumofe, Chief Technology Officer of Akamai, discusses zero-trust security models and how they impact employee morale. Security: What is your background and current role?...
As companies emerge from the pandemic, and 40% of employees are planning to switch jobs1, corporate data is at risk. Files are being uploaded, shared, synced...
Recent Comments