During the webinar we will discuss how logging end-user activity will help you detect malicious activity, see the detail behind a possible threat and improve security measures that deter future threats. Topics will include:
Effective detection mechanisms that provide alerts to potential threats;
How to obtain...
The threat landscape has changed significantly in the past year, creating the demand for new security strategies. And with the
acquisition of Mandiant, FireEye also has changed significantly and now provides security strategies and solutions from first alert to
remediation.
In this transcript of the video...
Eight defendants have been charged in an alleged identity theft fraud scheme involving the theft of personal information from a call center for use in unauthorized wire transfers and to obtain payment cards.
Two New York hospital ER clerks have been charged with illegally accessing the medical records of hundreds of patients, many of whom were quickly solicited by lawyers and "medical mills."
Security experts are sizing up the challenges that would be involved in implementing a federal government proposal to continuously monitor employees and contractors with security clearances in hopes of preventing leaks of sensitive information.
The investigation of the disappearance of Malaysian Flight 370 is raising issues that are very similar to those considered in cybersecurity cases, ranging from the insider threat to deleting data from a computer.
At his March 11 Senate confirmation hearing, Navy Vice Adm. Michael Rogers, chosen by President Obama to be the next director of the National Security Agency, declines to characterize NSA leaker Edward Snowden as a traitor.
2014 is finally the "The Year of Security." When the year stars fresh on the heels of the announcement that Target has suffered a data breach that impacts tens of millions of consumer payment cards ... that gets attention. And when that's followed up quickly with a second major breach, this one of luxury retailer...
The leader of a crime ring that used stolen Social Security numbers to commit $4 million worth of bank, credit card and tax fraud has been sentenced to 12 years in prison for his role.
As the U.S. federal government tightens procedures to prevent Edward Snowden-type insider leaks, agency leaders are discovering that implementing well-thought-out plans isn't easy.
A new study by Symantec reveals that employees steal corporate data and do not believe it is wrong. The findings show that everyday, employees' attitudes and beliefs about intellectual property theft are at odds with the vast majority of company policies. The survey - conducted by Ponemon Institute, an independent...
Financial services firms enjoy a few advantages over organizations in other industries. Banks and investment firms tend to have larger IT/security budgets and highly experienced security staff members. Large metropolitan banks also have more lucrative salary structures, and so they also have the luxury of recruiting...
As large scale breaches become increasingly commonplace, organizations need to rethink breach prevention initiatives. Breaches can be initiated by malicious or even benign insiders, as well as from external threats who are able to acquire the credentials of trusted insiders.
This whitepaper explains how...
How can organizations mitigate the risks posed by the unintentional insider threat? The strategy requires a combination of technical and non-technical solutions, says researcher Randy Trzeciak.
An independent presidential panel makes recommendations to limit the National Security Agency's surveillance methods, including curtailing the way the government systematically collects and stores metadata from Americans' phone calls.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.