Ransomware Takes a Dangerous New Turn

I think everyone can agree that ransomware is dangerous enough as it is. It has taken down numerous companies, hospitals, cities, and government agencies. It has also brought down important segments of infrastructure as evidenced in the Colonial Pipeline attack. So, how can it get any worse? To find the answer to this question, it's … Continue reading Ransomware Takes a Dangerous New Turn

Identifying Potential Malicious Insiders

All insider threats are not created equal, however, all can do equal amounts of damage to a company or organization. I have written on this topic before in relation to the F.B.I.'s IDLE program, which was begun to help companies find malicious insiders. In this post, I want to focus more on the insiders themselves, … Continue reading Identifying Potential Malicious Insiders

Whac-A-Mole: Profiling and Stopping the Malicious Insider

Two-thirds of data breaches involve insiders giving information to outsiders, whether they are aware of what they are doing or not. According to a report by Kroll Advisory Solutions, “moles, opportunists, contractors, disgruntled employees, and ex-IT personnel—all currently pose a greater risk to corporate intellectual property than state-sponsored hacking and APTs, both in frequency and … Continue reading Whac-A-Mole: Profiling and Stopping the Malicious Insider