2015 Vormetric Insider Threat Report Trends and Future Directions in Data Security - Retail Edition

In the past, insider threats resulted mainly from employees with access to financial data or other secret and sensitive information. That's no longer the case today. Today, employees with legitimate access, service providers or contractors that maintain infrastructure and privileged users are all possible actors, and potential attack vectors when their credentials are compromised. Criminal hackers are the biggest threat to retailers. While retailers have increased spending to protect consumer data, there is still sensitive data being exposed. This report provides trends and future directions in data security that can help retail IT security make their tough decisions. This Research Brief highlights the results collected online by Harris Poll from 102 IT decision makers in U.S. retail enterprises in the Fall of 2014. U.S. results are compared, where applicable, to findings among IT decision makers in other U.S. enterprises, as well as those in other countries.

Spotlight

iboss Cybersecurity

iboss Cybersecurity defends today’s borderless networks against advanced threats and data exfiltration with innovative Web Security, Mobile Security and FireSphere™ Advanced APT Defense. Unlike legacy technology focused solely on keeping malware out, iboss offers a balanced approach with equal emphasis on prevention, detection and containment to reduce loss from data breaches. Backed by patented technology and unparalleled visibility across all inbound/outbound data channels, iboss smart defense provides security weapons that reveal blind spots, detect breaches and minimize the consequences of data exfiltration. Leveraging leading threat protection and unsurpassed usability, iboss is trusted by thousands of organizations and millions of users.

OTHER WHITEPAPERS
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

The State of Zero Trust Security 2022

whitePaper | September 27, 2022

The philosophy of Zero Trust security—“never trust; always verify”—has certainly struck a chord. It took decades for organizations to move past the basic castle andmoat security mindset, and to accept that in a cloud world, there is no perimeter to defend, and intruders are always on our networks.

Read More
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 16, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More
news image

Best Practices for Row Level Security in Tableau with Entitlements Tables

whitePaper | January 18, 2023

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

C2 Password Security White Paper

whitePaper | November 24, 2022

In recent years, the necessity to create and maintain dozens or hundreds of online accounts with logins and passwords has become more and more prominent, especially with remote work on the rise and internet usage at an all-time high. Nothing is more secure than making sure that every one of your accounts that you create is using a unique or randomly generated password, but where do you keep track of all of these passwords, and how can you ensure that your password security is up to par?

Read More

Spotlight

iboss Cybersecurity

iboss Cybersecurity defends today’s borderless networks against advanced threats and data exfiltration with innovative Web Security, Mobile Security and FireSphere™ Advanced APT Defense. Unlike legacy technology focused solely on keeping malware out, iboss offers a balanced approach with equal emphasis on prevention, detection and containment to reduce loss from data breaches. Backed by patented technology and unparalleled visibility across all inbound/outbound data channels, iboss smart defense provides security weapons that reveal blind spots, detect breaches and minimize the consequences of data exfiltration. Leveraging leading threat protection and unsurpassed usability, iboss is trusted by thousands of organizations and millions of users.

Events