Cloud blurs personal and corporate identities

Cloud blurs personal and corporate identities

When hackers posted online contact lists and other documents stolen from the AOL account of CIA Director John Brennan, they not only exposed a security breach with national security implications. They also shined a light on a glaring...

Why we need behavior-centric detection and response

Why we need behavior-centric detection and response

According to the Verizon 2015 Data Breach Investigations Report (DBIR), 60 percent of the time, attackers were able to compromise an organization within minutes. Meanwhile, in more than 75 percent of the cases, the average time to...

How to prevent identity theft in your business

How to prevent identity theft in your business

Identity theft, historically considered a consumer threat, is expanding its horizons. Looking for bigger game, attackers are targeting the enterprise with similar tactics used to hijack online and financial accounts belonging to...

What can we learn from JPMorgan’s insider breaches?

What can we learn from JPMorgan’s insider breaches?

Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on charges of stealing customer data and trying to sell it. Similar incidents have occurred multiple times at JPMC over the past few years. Upon...

Identity as an attack surface

Identity as an attack surface

Mobile computing, cloud apps and tele-working have effectively made the de-perimeterization of IT security a “fait accompli”. In the process, these redrawn battle lines have created new challenges for CSOs and new points of entry for...

Load More
Top Blog Posts