

Isaac Kohen
Want to Join?
Opinions expressed by ICN authors are their own.
Isaac Kohen started his career in quantitative finance developing complex trading algorithms for a major Wall Street hedge fund. During his tenure at Wall Street and his subsequent experience securing highly sensitive data for large multi-national conglomerates, he identified the market need for a comprehensive insider threat and data loss prevention solution. And so, Teramind was born.
The opinions expressed in this blog are those of Isaac Kohen and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

How GDPR impacts US cybersecurity policy
With the GDPR in full effect, expect to start seeing an impact in the US sooner vs. later. All it will take is the next major data breach for the American public to start demanding ownership of their personal data.

Cybersecurity outlook: data protection takes center stage
From an ever-increasing uptick in data breaches to the rise of Cybercrime-as-a-Service, data protection will continue to be top of mind for CIOs and their teams through 2018 and beyond.

Why enhanced authentication methods should play a bigger role in your security plan
As a further consequence of data breaches, the loss of employee data loss doesn’t just impact the employee; it can also cause measurable harm to the employer. Learn how impactful such a breach could be for your company and how to...

How managers can best communicate the importance of cybersecurity to employees
We must challenge ourselves to think differently about how and what we’re communicating if we want to be successful in making security a priority for our employees.

How to ensure that giving notice doesn’t mean losing data
The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

Ransomware prevention is insider threat mitigation
Addressing the insider threat to help deter exposure to ransomware.

Protecting intellectual property against cyberattack
The news is full of data breaches that hold hostage or expose customer information. But attacks targeting intellectual property (IP) can do great damage as well. What do we know about the characteristics of IP attacks, and how can IP...

2018 Crowd Research Partners 'Insider Threat Report': hopes and fears revealed
An overwhelming number of organizations feel vulnerable to insider attacks – but you might be surprised at the top three risk factors enabling this vulnerability.

How employee monitoring can help solve England's productivity problem
Can the data you get from employee monitoring software help drive productivity – and other financial – benefits?

Government entities remain vulnerable to insider threats
Recommendations on how the U.S. Postal Service and other government entities can improve cyber security.

How to calculate your return on security investments
While there certainly are ways to detail the ROI of security, there's still a lot of miscalculation that happens when it comes to the true cost of a security incident.
-
White Paper
-
White Paper
-
White Paper
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored