Installed 3rd Party Apps over SaaS platforms are for enterprise what mobile App Store apps were for consumers in 2009. You think you are getting a free ping pong game without realizing that all your contacts, personal messages and location history is being exfiltrated to external servers! Optimized workflow. Better collaboration. Improved user experience.Increased performance. That’s […]

Two-factor authorizations: no longer an option for any organization
As cybercrime increases amid the COVID-19 chaos, companies are struggling to protect their customers’ data, putting many at risk of becoming victims of credential and identity theft. A password system alone isn’t enough to keep your organization safe from hackers, who have become much more skilled and sophisticated than ever before. Learn more about two-factor […]

Cybersecurity Perspectives from a Former FBI Agent
Kevin Kline, a 30+ year veteran of the FBI with a focus on National Security investigations, has dealt with cyber threats globally. He is currently helping organizations negotiate ransomware and develop defensive policies of protecting against insider threats. In this interview, he speaks to us about:

What is CASB, & why it matters
Cloud-hosted products come with data exfiltration risks that are not well understood. This has definitely been heightened by remote teams and haphazard cloud adoption during COVID-19. Today’s IT teams face a multitude of cloud security challenges: managing remote access to applications; preventing data leakage, ensuring users are who they see are; watching for malware and […]

The ugly truth about security software: getting buried under too many false positives
False positives are expensive!! According to a Critical Start survey, for every sixty minutes security operations centers (SOCs) run, fifteen minutes are wasted on false positives. Further, the study reveals that, on average, a typical organization wastes 286 to 486 hours per week on false positives. Image Source What are false positives? False positives are alarming […]

How are security leaders thinking of 2021 budgets
The rapid rate at which security technology is evolving can make it challenging to evaluate and measure the success of security systems. However, you can properly monitor the effectiveness of your security system and strategy by clearly identifying your desired outcomes and aligning them with your budget. Cisco Secure conducted the Security Outcomes Study in 2020 to […]

Common SaaS security threats for financial institutions & how to prevent them
When HelpSystems surveyed 250 CIOs and CISOs in financial institutions to learn about their top cyber concerns and challenges, 35% of respondents cited insider threats as having the potential to cause the most damage in a year. This statistic is representative of the pervasive fear financial institutions have of insider security threats, which could prove to be […]

Behavioral science approaches towards better security outcomes
If politicians use it, then why shouldn’t enterprises? We’re talking about nudging – a form of behavioral science. The theory behind nudging is that, by presenting information in a new way, you can gently influence people towards making better choices. The concept rose to prominence in the Obama administration, when Obama made Cass Sunstein, the […]

Accidental data breaches: 3 golden rules for effective cybersecurity training
Accidental data breaches are a big and rising cost for businesses. Ponemon research shows that the majority (62%) of insider threats are caused by employee negligence or human error, with the average incident costing businesses $307,000 each time. The rise of remote working, as a result of the pandemic, has created an even more fertile environment for […]

Insider trading in the post-SPAC (& Reddit) era: Who’s minding your Slack Connect & Teams?
Reddit groups behind large stock moves recently are presumably bringing the power of the masses against Wall Street. While this is technically legal, a lesser publicized shift is happening in how insider trading is proliferating via SaaS communication tools. The proliferation of SPACs is creating more opportunities for ‘small exchange of info’ to make dramatic […]

Insider threat protection for financial services: implementation challenges for SaaS applications
Research from HelpSystems surveyed 250 CIOs and CISOs in financial institutions and found that 35% found insider threats to have the potential to cause the most damage over the next 12 months. This statistic goes to show the purveying fear that surrounds financial institutions with insider security threats that could prove to be quite costly to them […]