WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

May 5, 2022 | Jonathan Daly

Insider Risk Management or Insider Threat Surveillance?

The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…

Read More

February 8, 2022 | Rajan Koo

2022 Insider Risk Report ~ The Rise of the Super Malicious Insider

Earlier today we published our 2022 Insider Risk Report, our fifth consecutive since 2017. The purpose of our reports…

Read More

May 10, 2022 | Jonathan Daly

Privacy Makes all the Difference: Insider Risk Management and Insider Threat Surveillance

As insider risks, whether born from negligence, external intimidation, or true malicious internal threats, grow, organizations need to take steps…

Read More

April 20, 2022 | Jonathan Daly

Why Striking the Balance Between Insider Risk and Privacy is More Important Than Ever

The last three years have changed the workplace more than any other period in history. We’re now in a new…

Read More

December 16, 2021 | Armaan Mahbod

CISA Insider Threat Self-Assessment Tool Hits the 'Metadata' Point

In late October the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National Security…

Read More

December 7, 2021 | Armaan Mahbod

The Grinch of the Enterprise: Attackers That Take Advantage of Risky Employee Behaviors

With the holiday season upon us, it’s truly an incredible time of year. Folks are planning holiday get-togethers, searching for…

Read More

October 6, 2021 | Musa Ishaq

Stories from the Field - Kaseya REvil Ransomware Attacks

Welcome back to our Stories from the Field series, where we share info on how our Insider Threat analysts work…

Read More

November 26, 2019 | Jonathan Daly

Analyst Breach Insights Week of November 26: Macy’s Breach(es), the Definition of Insanity, and Breaking the Cycle

In this week’s Analyst Breach Insights, we’re discussing Macy’s recent data breach, as well as the broader question: why is…

Read More

June 14, 2019 | Jonathan Daly

Catching Complex Threats: The Rise of Credential Stuffing

The number of attack vectors and exploitation methods that organizations must address grows exponentially everyday. One such vector that has…

Read More

December 22, 2015 | Dtex Systems

5 Reasons Why Elf on the Shelf is Santa's Endpoint Visibility

I’m about to ask you a question that might derail your entire day: Did you move your Elf on the…

Read More