9 factors reducing insider threat and enhancing cyber security

February 6, 2019

Insider threat, or the human element, reportedly accounts for the majority of cyber security incidents. This suggests that technical control systems alone are not sufficient to address cyber security risk. Similarly, the majority of insider threat incidents are unintentional, so a focus on the motivations of a malicious attack would also be insufficient. We need to understand non-malicious human limitations and causes of cyber security incidents. This whitepaper describes 9 factors which have been tried-and-tested to reduce insider threat.

Spotlight

Positive Technologies

We have earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, SS7, Vulnerability Management, SIEM, Web Application and ERP security, anywhere. Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. We are among the world’s most advanced specialist researchers, renowned security experts and highly-skilled programmers. With one of the largest and most dynamic research facilities in the world, Positive Technologies carries out research, penetration testing and threat and vulnerability analysis on dozens of large-scale networks each year. As a result we have developed a unique understanding of how security should work, across a wide range of geographies and systems. We earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, anywhere. Hands-on experience, underscored by a decade of se

OTHER WHITEPAPERS
news image

Cybersecurity: A Comprehensive Risk Management Approach for Healthcare

whitePaper | August 19, 2022

Healthcare entities continue to face evolving cybersecurity threats that can put patient safety, privacy and operations at risk. Health information security breaches occur daily and will continue to accelerate as cyber-criminals recognize the value of patient data and the critical need for provider organizations to keep systems up and running. The cost of a data breach is astounding, and one few healthcare organizations can absorb as they continue to deal with the effects of the COVID-19 pandemic.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

GBM Security Whitepaper

whitePaper | November 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation is rapidly becoming a key priority in most industries, as organizations adapt to changing markets by leveraging technologies to build IT-centric business models. In general, organizations are using digital transformation to reach their goals of achieving greater agility, improving operational efficiency, improving customer experiences, and developing new revenue streams.

Read More

Spotlight

Positive Technologies

We have earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, SS7, Vulnerability Management, SIEM, Web Application and ERP security, anywhere. Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. We are among the world’s most advanced specialist researchers, renowned security experts and highly-skilled programmers. With one of the largest and most dynamic research facilities in the world, Positive Technologies carries out research, penetration testing and threat and vulnerability analysis on dozens of large-scale networks each year. As a result we have developed a unique understanding of how security should work, across a wide range of geographies and systems. We earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, anywhere. Hands-on experience, underscored by a decade of se

Events