Insider
Insider Risk: Theft of Trade Secrets Nets Thief Six Months
An interesting case of insider risk wrapped up recently in the Federal District Court in Massachusetts when U.S. Senior District Court Judge William G. Young handed down a lenient sentence to Haoyang ...
IT admin admits sabotaging ex-employer’s network in bid for higher salary
A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer’s computer systems. Casey K Umetsu, of Honolulu, Hawaii, has ...
Teachable Moment: An Insider Threat on Your Team
No manager or executive wants to receive a phone call informing them that a team member has engaged in suspicious activities that require a security investigation. But that’s just what happened to ...
Cybercriminals Inducing Insiders to Plant Malware
Those who manage insider threat programs just got a healthy reminder from researchers at Abnormal Security who detailed how their deployed tools detected a new insider recruitment tactic—this time involving ransomware. Insider ...
Tala welcomes Jim Routh to its Board of Advisors
Tala is incredibly excited to announce a new addition to our team. Jim Routh has joined the company as an Advisor to Tala. ...
Mercy Health Fired Employee Responsible for Insider Breach
Mercy Health revealed that it had fired an employee who was responsible for an insider breach involving its systems. On December 4, Mercy Health posted a notice informing its patients of a ...
Amazon Discloses Security Incident Involving Customers’ Email Addresses
Amazon informed some of its customers about a security incident that involved the unauthorized disclosure of their email addresses. News of the security incident emerged over the weekend of October 23 when ...
Report: Nashville company pays ex-employee ransom installments only to stall him until the cops make the bust
A global phone insurance and tech support company headquartered in Nashville, Tennessee has resorted to paying ransom to an alleged ex-staffer after receiving emails claiming he stole private info of thousands of ...
Prying Eyes Inside the Enterprise: Bitglass’ Insider Threat Report
When words like cyberattack are used, they typically conjure up images of malicious, external threats. While hackers, malware, and other outside entities pose a risk to enterprise security, they are not the ...
Vulnerabilities in SSD Encryption: Using osquery to Identify Vulnerable Windows Machines
Dark Reading and Forbes, among various other sources, have recently reported that Windows computers using the hardware encryption feature of many different types of solid-state drives (SSDs) are vulnerable to attacks that ...