Blog

The Best Defense Against Insider Threats
Data breach Insider threat

The Best Defense Against Insider ThreatsOne of the most critical skills information security groups have is the ability to proactively find threats in their environment – a process known as hunting.  Great hunting is the combination of deep knowledge about your environment with the ability to understand the details of changes that take place in real-time.  Knowledge is the greatest advantage information security professionals have when determining the best defense against an adversary.

Attackers must have extensive knowledge about your infrastructure to find weak spots to exploit.  You have an advantage by knowing what are normal patterns of behavior from your users and systems.

Once More Unto The Data Breach, Dear Friends, Once More
Cybersecurity Data breach Insider threat

Fasoo would have stopped the leak of CIA documentsWikiLeaks recently obtained and released thousands of sensitive documents showing the Central Intelligence Agency’s (CIA) arsenal of hacking tools, malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

Unfortunately this is not a Shakespearean play, but a real life data breach that will have huge consequences for the security of the US government.  This information supposedly came from a secure location inside the CIA and raises a lot of questions about cybersecurity.  If an agency that should be focused on security can have this problem, what other problems may lurk in other parts of the government?