Blog

The Insiders – A Look at the Capital One Data Breach

by Jasmine Chennikara-Varghese In July, Capital One reported a breach that compromised the personal information for about 100 million customers. A former employee of a third-party service stole the data earlier in the year and Capital One initially discovered the theft from a tip.  While data breaches and cyber attacks are now almost routine news, […]

Read more
GDPR – Year 1

The European Union’s (EU) General Data Protection Regulation (GDPR) has been in effect for over a year now. GDPR’s key objective was to empower people with more control over their personal data.  GDPR requirements have impacted compliance and forced an evolution in the privacy landscape. With potential penalties of up to €20 million, or 4% […]

Read more
Shall we play a game?

It’s that famous line delivered by Joshua (a.k.a. WOPR, or War Operation Plan Response) to Matthew Broderick in the movie WarGames from 1983. It’s been a long time since that movie first came out, so here’s a quick refresher – Broderick thinks he’s hacking into a software developer and gains access to a host of […]

Read more
Why You Need to Move from Trust to Facts to Prevent the Inside Threat

We all know that the inside threat continues to grow. And as our infrastructure continues to increase in complexity, it becomes even easier for the insider. Just look at the recent headlines pulled from the past couple of months – companies like Microsoft, Apple, Tesla, Nordstrom and Micron Technology have all made the news because […]

Read more
Superman III and the Inside Threat

Yes, you read that right… a reference to a really bad 80s movie (1983 to be exact) and the inside threat. You must be wondering how the two are related. Before I explain, I want to make it clear that this is not a recommendation to watch this movie. In fact, it only received a […]

Read more
Key Highlights from the Verizon Data Breach Investigation Report 2019

by Jasmine Chennikara-Varghese This year’s Verizon Data Breach Investigation Report (DBIR) analyzes the current threat landscape and provides insights for improving cyber defenses. The 2019 DBIR is based on data gathered from more than 40,000 cybersecurity incidents and over 2,000 confirmed data breaches across 86 countries.  The real world data in the DBIR reinforces that […]

Read more
Insider Threat in the Cloud

By Jasmine Chennikara-Varghese As applications and the sensitive data they contain migrate to the cloud, the risks linked to insider threat persist. Cloud services empower end users to be more mobile, flexible and productive while also simplifying IT management and improving cost-efficiency. However, the cloud also expands the attack surfaces, enabling exploits and exposing vulnerabilities […]

Read more
It Only Took 20 Years to Uncover $40M in Fraudulent Payments at CBS Employees Federal Credit Union

You read that headline right… it took 20 years to uncover $40 million in fraudulent transactions by a former employee of CBS Employees Federal Credit Union. Well… unfortunately everyone is now a former employee of the credit union because they closed last week after this fraud came to light. The alleged suspect, Edward Rostohar, worked […]

Read more
Uncovering the Biggest Security Threats by Analyzing User Behavior

By Jasmine Chennikara-Varghese The biggest security threats are already inside your cyber landscape. Inside users silently navigate through your applications and databases, possibly exposing data through accidental misuse, compromised credentials or malicious intent. However, security teams prioritize monitoring and searching for attacks and intrusions coming from outside. Insider threat is usually considered mitigated with protections […]

Read more
What Do You Say After Uncovering $7.4 Billion in Fraudulent Transactions?

Imagine working as an auditor at PwC conducting an investigation into accounting irregularities when you uncover $7.4 billion in fraudulent transactions. What would your initial reaction be when the amount of fraud started to add up? “Houston, we have a problem!” Except this happened in South Africa in what is being called the largest corporate […]

Read more