Fortscale to Lead Security Discussion at Cybertech 2015

Some of the biggest names in security are converging on Tel Aviv, Israel this week to take part in the Cybertech 2015 International Conference & Exhibition, “The Event for the Cyber Industry.” The annual conference showcases leading technical innovation for

Attackers Want a Piece of Your PII

Would you be surprised if I told you that chances are your friend working as an engineer at Facebook can read your messages, see through your personally identifiable information (PII), location history, and profiles you visited?

Overcoming the daily challenges of a security team

The constantly evolving cyber threat landscape is resulting in new challenges and approaches for today’s security analyst teams…

The “Carbanak” Campaign – Challenging Behavior Analytics

Robbing a bank has definitely come a long way. Who needs guns and moneybags when you can just approach an ATM and it’ll willingly hand you a yearly salary, right?

Anthem Breach Proves Sensitive Assets Are In The Cross Hairs

We learned this morning that Anthem Inc., the second largest health insurer in the country, was “externally” attacked sometime last week. Recent reports suggest the personal data of over 80-million customers and employees has been exposed. Initial statements from people close to the investigation have indicated the attack was uncovered when a system admin noticed a database query running using his own identifying code. Later, investigators were able to track the exfiltration path to a distant web-storage service, but could not determine the volumes of the data leaked.

The Burning Questions - Are You Exposed to the Insider Threat?

Insider threats, whether malicious or not, remain one of the largest sources of concern for security teams. According to a recent survey of federal IT pro’s, more than half worried about breaches from careless or untrained insiders, while nearly a quarter of those polled expressed concern over malicious insiders. No security team wants to be caught unprepared, but how do you stay in front of the problem? How do you recognize a potential insider threat before any real damage can be done? Here are four questions every organization should ask themselves to be proactive against insider threats.

1 2 3 4