Skip Navigation

Daily Insider Threat News – October 10, 2017

NEWS

Thousands of Morrisons staff sue over personal data leak

IT PRO

David Emm, principal security researcher at Kaspersky Lab, said that the insider threat represents one of the greatest challenges to businesses trying …

User Behavior Analytics Alone is Not Enough for Combatting Insider Threats

Infosecurity Magazine (blog)

I recently read an article in Infosecurity about a presentation at the Infosecurity North America conference related to combatting insider threats.

Cyber Risks in the Workplace: Managing Insider Threats

The National Law Review

While developing the facts, a company should consider when or how to suspend or revoke a suspected insider threat’s access or take additional …

Forgotten Office 365 accounts targeted by stealthy attack campaign

ZDNet

Insider threats can pose even greater risks to company data than those associated with external attacks. New Trojan malware campaign sends users …

Treasuries leave“doors open” to fraud without supplier checks

Global Trade Review (GTR)

In one of its papers Sharing Insider Threat Indicators: Examining the Potential Use of SWIFT’s Messaging Platform to Combat Cyber Fraud the …

AWS Cloud Hacked by Bitcoin Miners

EnterpriseTech

Security analysts also recommend stepped up monitoring in order to detect insider threats or compromised public could accounts.

Postal Service’s IT not fully protected from insider threats, watchdog says

FedScoop

Federal agencies possessing national security information are mandated by October 2011’s Executive Order 13587 and the National Insider Threat …

Cyber Risks in the Workplace: Managing Insider Threats

Inside Privacy

Today, one of the most critical risks a company can face is the cyber risks associated with its own employees or contractors. Companies are …

 

This entry was posted on Wednesday, October 11th, 2017 at 1:45 pm. Both comments and pings are currently closed.

Discover more from Insider Threat Management Group

Subscribe now to keep reading and get access to the full archive.

Continue reading