Morgan Stanley Insider Data Theft Spotlights ‘Profiling Analytics’

Wall Street Journal Clint Boulton Chief information officers establish firewalls and other layers of defense to keep hackers from stealing their corporate data. But what if the danger exists inside the moat? Analytics that profile employees’ digital work activities may

Unsettling Truths, Unanswered Questions in Morgan Stanley Breach

American Banker Penny Crosman The leak of client records at Morgan Stanley illustrates the danger posed when just one employee has unauthorized or unsecured access to sensitive information, as well as the ongoing threat to financial institutions from insider theft.

WHAT WE LEARNED AT SPLUNK CONF. 2014

With more than 150 sessions, 70 customer presentations, and an audience of more than 4,000 IT and business professionals, Splunk conf.2014 was the perfect spot to debut our latest innovations and officially launch the Fortscale User Behavior Analytics platform.  

Enterprises Are Shifting Towards A New Approach In Understanding And Analyzing Insider Threats

A recent survey conducted by the Ponemon Institute suggests an overwhelming majority of IT personnel feel that recent disclosures of highly sensitive information by wiki leaks and Edward Snowden have had an effect on their organization. A similar percentage of respondents believe

Playing Your Hand - User Intelligence

Cyber warfare and poker. Two completely different subjects but with certain undeniable similarities. We’ve all heard a lot about the poker craze over the past few years- either from the sports channels or from friends who participate in online or onsite tournaments. When it comes to poker, the same big question always surfaces - which has a bigger influence on the outcome - pure luck or the participant’s skills? Many books have been written, the best poker players in the world have been asked, and all of them point to the same conclusion- skills and expertise.