Allowing employees to use their personal devices for work purposes has become a common practice in many organizations. However, a new report from SlashNext reveals that this practice comes with significant risks, as 71 percent of employees store sensitive work data on their personal devices. The report also found thatContinue Reading

Insider threats have always been a concern for organizations. Employees, contractors, or third-party vendors with authorized access to sensitive information can cause significant harm to an organization’s reputation and financial well-being. In today’s digital world, cloud computing has become a ubiquitous part of most organizations’ IT infrastructures, making it evenContinue Reading

An effective threat hunting is critical because it is hard to think like attackers and to search for the unknown in an enterprise network. This post may help organizations for an effective and successful threat hunting. Knowledge of Topology and Environment The purpose of threat hunting is to find theContinue Reading

Because an insider is an employee, is a trusted person and has access to various data, insider threats are major risks for organizations. Organizations are investing to prevent perimeter against external threat but focusing less on internal threats. This is the other factor that making insider threat more risky. AttacksContinue Reading