Blog

Blog

The History of Data Breaches

As the wave of data breaches continues to crash down on companies, let’s take a look back at some of the largest and most damaging data breaches on record. Read on for a historical walk through breaches over time as well as resources for preventing data breaches.
Blog

What Does an Insider Threat Analyst Do?

Learn about what an insider threat analyst does, along with how they affect existing procedures, policies, and protection layers in organizations in Data Protection 101, our series on the fundamentals of information security.
Blog

The Early Indicators of an Insider Threat

Whether malicious or negligent, insider threats pose serious security problems for organizations. Forrester Senior Security Analyst Joseph Blankenship offers some insight into common early indicators of an insider threat.
Blog

Why Your Employees are a Bigger Threat than Hackers

Global cybercrime costs could reach $2 trillion by 2019. That’s up 3X from 2015, which was only a paltry $500 billion by comparison. Surprisingly, though, hackers should be the least of your worries.
Blog

WannaCry: What’s in a name? Confusion.

The WannaCrypt ransomware was nothing special. Companies were done in by nasty software exploits and endemic insecurity in the form of unpatched and unpatchable legacy systems.
Blog

Kelihos and the Ransomware Ecosystem

Botnets have been a serious problem on the web for more than 15 years, and as the network has changed, botnet operators have had to adapt in order to continue making money. While launching DDoS attacks on demand once was the main revenue stream for these cybercriminals, things have changed in recent years to include the paid installation of ransomware, banking trojans, and other types of malware.