This past week, hackers took advantage of a 0-day to steal ISP customers' credentials, a former Verizon employee pleaded guilty to feeding info to a Chinese spy agency, and more. Get up to speed in this week's Friday Five!
This past week, BreachForums was taken down for a second time, an Arizona woman was arrested for her role in a North Korean remote work scheme, CISA and the NIST released new guidance, and more. Catch up on all the latest news in this week's Friday Five.
An FBI report on rising cybercrime topped this week's headlines and was further underscored by an IP theft scandal at Google, but new initiatives from the White House and NSA aim to combat such threats. Get up to speed on these stories and more in this week's Friday Five!
In this week's Friday Five, learn how internal threat actors are finding success, the U.S. and allies are fighting foreign espionage campaigns, a new bill could fortify the U.S. cybersecurity workforce, and more.
Your employees are everywhere. So is your data. Have we equipped our teams to deal with this situation?In this on-demand webinar, cybersecurity industry veteran and Fortra’s Director of Product Management for Data Protection Wade Barisoff will discuss his experience on both sides of the table, both as a Fortune 500 security director as well as leading product direction at Fortra.Our 30-minute...
A rise in cyberattacks’ volume and sophistication, lawmakers cracking down on privacy, the rising threats to critical infrastructure, and more. Catch up on these stories and more in this week’s Friday Five!
A recent report said that almost half of data breaches involve an insider element. In this blog we define what constitutes an insider threat and give you nearly 50 examples to help illustrate the threat further.
This company protected its sensitive data with biometric thumbprint scanner but still managed to suffer trade secret theft after a former director of research allegedly stole gigabytes of data on its recipes.
Verizon's new Insider Threat Report breaks down five categories of inside threat actors and outlines 11 steps to reduce risk and defend against malicious insiders.
Your organization regularly faces threats to sensitive data from both inside and outside the organization. The team charged with delivering your information security can tell stories about what they learn from the solutions in place. Digital Guardian manages security programs for hundreds of customers, globally, we see hundreds of stories every day. We see the novel threats that can turn into...
Federal agents apprehended a former Apple employee last week suspected of stealing intellectual property, including engineering schematics on the company's secret self-driving car technology.