Advanced privilege management solutions are simple to deploy and easily integrated with different systems, meaning businesses can enjoy security peace of mind without impacting user productivity, while cutting helpdesk calls.
Active Directory (AD) is the primary authentication and authorisation directory for over 90 percent of the world's enterprises and some 500 million active user accounts, making it a common target for cyber-attacks.
Leaking of the Paradise Papers raises several questions, as it should for all organisations, including Appleby itself, about how you manage, control and report on access to your sensitive data.
Patrick Sullivan, director, security technology and strategy at Akamai Technologies explains the concept of Zero Trust perimeters and cloud perimeters in an interview with SC Media UK's editor-in-chief, Tony Morbin.
Privileged access - not people - is the true insider threat says David Higgins. Securing privileged accounts should be on-going with continuous evaluation and adjustments to improve security as the threat landscape changes.
Simon Cuthbert explains the importance of Access Rights Management when it comes to meeting the GDPR's principle of least privilege.
A malicious insider who came back for revenge on the paper company that once employed him has been sentenced to nearly three years in prison.
To combat alert fatigue among its security analysts, transportation service Uber applies specially customised data sets to flagged incidents to help distinguish between genuine threats and non-malicious activities.
Faith MacAnas discusses best practices for business owners to defend their company against insider threats, whether malicious or inadvertent, with education and monitoring the key responses.
More than a quarter (26 percent) of organisations were breached in the last year.
Matthias Maier examines why some businesses are worried about the threat posed by internal users and what can be done to combat them.
The NSA's latest alleged leaker apparently had a variety of issues, including alcohol abuse and criminal charges, which did not cast doubt on his security clearance.
Chris Inglis, former deputy director at the NSA, says the organisation had not been prepared for an insider threat of the magnitude of Edward Snowden and rejected calls for him to be pardoned.
Keith Lowry took time on a trip to Australia to warn that background checks do not make the cut when trying to stop insider threats.
Dana Simberkoff discusses what organisations can learn from the Sage incident and how to stop insider threats in their tracks through policy creation and internal safeguards
A survey recently conducted by Imperva showed that 36 percent of surveyed companies have experienced security incidents involving malicious employees in the past 12 months.
Stacy Leidwinger looks at the Hillary Clinton email scandal and how companies can avoid the potential security risk of staff using shaddow IT.
The recent tragedy at the Orlando nightclub has perhaps given new meaning to a report by ICIT on how radical groups like IS use social media to radicalise potential recruits
Mav Turner shares top tips to help IT pros address the growing issue of insider threats within their business.
The entire company must be aware of security risks, and their role, with safeguards in place to make it harder for mistakes to happen, as well as training to raise awareness of the consequences of a leak says Jens Puhle.
What are organisations doing wrong when it comes to dealing with the insider threat? That was the topic of conversation when we sat down recently with Mark McClain.
Cyber-security threats are continuing to increase around the globe, including at small and large organisations in the United Kingdom says Mat Ludlam.
Insiders pose the biggest risk to business data since they are given trusted access to sensitive data, yet they often go completely undetected.
Insider threats aren't always malicious: how organisations allow employees to continue to be the weakest link
Norman Shaw unpicks the innocent mistakes that employees make which, unlike cyber-security, there's no budget to reduce.
Insiders with authorised access to sensitive information represent credible and growing security threats, which businesses should ignore at their peril says Mark Kendrew.
When looking for the insider threat, don't assume you will find a Snowden or Manning in your midst - you may find instead that someone in a trusted position has become an unwitting helper for an outside threat, says Dr Eric Cole
Partially attributed by poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider.
Rashmi Knowles, RSA's chief security architect, warns of the looming dangers of the disgruntled, vengeful or merely careless employee.
New research conducted by Clearswift shows that finance and HR departments represent the biggest information security threat to business.