Blog

Global Energy Corporation Implements Exception-Based System Access Security Monitoring

by Rohan Bhatia, Senior Manager, Enterprise Application Solutions at Protiviti and Brandon Drake, Manager, Enterprise Application Solutions at Protiviti These days, when remote working is forcing nearly every organization to take a close look at their security practices in efficiently providing the proverbial “to find the needle in the haystack,” a tool like SAP Access […]

Read more
360° Control Automation, Monitoring & Enforcement

Guest Blog by Michael Rasmussen, Research Analyst at GRC 20/20 Research Business today is changing minute-by-minute and second-by-second. Processes and technology and their configurations are changing. Employees and their access into systems are changing as they are hired, change roles, inherit rights, and ultimately leave the organization. Transactions and vendors are changing. The pace of […]

Read more
Managing Insider Threats

by Jasmine Chennikara-Varghese, Greenlight Technologies Employees are perhaps one of the most challenging security risks to the modern business landscape. Insider threat comes from those authenticated and authorized users performing potentially damaging activities from within your trusted landscape. While keeping the bad guys out is critical, the insider threats are harder to discern and happen […]

Read more
The Insiders – A Look at the Capital One Data Breach

by Jasmine Chennikara-Varghese In July, Capital One reported a breach that compromised the personal information for about 100 million customers. A former employee of a third-party service stole the data earlier in the year and Capital One initially discovered the theft from a tip.  While data breaches and cyber attacks are now almost routine news, […]

Read more
GDPR – Year 1

The European Union’s (EU) General Data Protection Regulation (GDPR) has been in effect for over a year now. GDPR’s key objective was to empower people with more control over their personal data.  GDPR requirements have impacted compliance and forced an evolution in the privacy landscape. With potential penalties of up to €20 million, or 4% […]

Read more
Shall we play a game?

It’s that famous line delivered by Joshua (a.k.a. WOPR, or War Operation Plan Response) to Matthew Broderick in the movie WarGames from 1983. It’s been a long time since that movie first came out, so here’s a quick refresher – Broderick thinks he’s hacking into a software developer and gains access to a host of […]

Read more
Why You Need to Move from Trust to Facts to Prevent the Inside Threat

We all know that the inside threat continues to grow. And as our infrastructure continues to increase in complexity, it becomes even easier for the insider. Just look at the recent headlines pulled from the past couple of months – companies like Microsoft, Apple, Tesla, Nordstrom and Micron Technology have all made the news because […]

Read more
Superman III and the Inside Threat

Yes, you read that right… a reference to a really bad 80s movie (1983 to be exact) and the inside threat. You must be wondering how the two are related. Before I explain, I want to make it clear that this is not a recommendation to watch this movie. In fact, it only received a […]

Read more
Key Highlights from the Verizon Data Breach Investigation Report 2019

by Jasmine Chennikara-Varghese This year’s Verizon Data Breach Investigation Report (DBIR) analyzes the current threat landscape and provides insights for improving cyber defenses. The 2019 DBIR is based on data gathered from more than 40,000 cybersecurity incidents and over 2,000 confirmed data breaches across 86 countries.  The real world data in the DBIR reinforces that […]

Read more
Insider Threat in the Cloud

By Jasmine Chennikara-Varghese As applications and the sensitive data they contain migrate to the cloud, the risks linked to insider threat persist. Cloud services empower end users to be more mobile, flexible and productive while also simplifying IT management and improving cost-efficiency. However, the cloud also expands the attack surfaces, enabling exploits and exposing vulnerabilities […]

Read more