ObserveIT
Follow
2091 Followers
Follow ObserveIT on their other social channels!
About Us
Founded:
2007
Company Size:
51-200 employees
Company Type:
Private
Location:
Boston, MA. USA
Website:
ObserveIT is a user monitoring and investigation solution that identifies and eliminates insider threats. It continuously monitors user behavior and alerts IT and Security teams about activities that put their organizations at risk. ObserveIT provides comprehensive visibility into what all users are ...
Read more
Promoted Content
[report] 2018 Cost of Insider Threats: Global Organizations
Follow
97
How to Prevent Insider Threat Incidents: A SunTrust Case Study
Insider threats are on the rise, with criminal or malicious insiders serving as one of the top causes of incidents at organizations worldwide. According to a recent report from The Ponemon Institute, a malicious insider threat can cost an organization $2.8 million per year, or an average of $604,092 per incident. As if those numbers weren’t enough of an eye-opener, just this week, regional banking giant SunTrust experienced a major potential malicious insider breach, resulting in the loss of p ...
Follow
171
Spies Among Us: The Rise of State-Sponsored Insider Threats
Chinese-born Greg Chung seemed to Rockwell and Boeing like any other loyal, reliable, hardworking engineer. Little did his employers know, Chung was collecting secret information that would help his home country develop its own space program.From 1979-2006, he stole hundreds of thousands of sensitive documents about the space shuttle, Delta IV rocket, and C-1 military cargo jet from his employers and handed them over to the Chinese government. For years, he traveled to China under the guise of g ...
Follow
144
4 Reasons Data Loss Prevention Tools Aren’t Cutting It
Data loss prevention software is designed to detect data leakage and exfiltration by keeping an eye on sensitive data while it is in use, in motion, and at rest. There’s a reason these tools exist. In 2017, about 3 million records were stolen every day. While only the biggest data loss incidents, like the Equifax breach, make the headlines, it’s a risk that applies to businesses of all sizes, types, and industries.Keep Reading
Follow
79
5 Ways Insiders Can Accidentally Pose a Threat to Your Organization
When organizations consider the threat posed by insiders, often they think first of malicious intent. How will we protect ourselves against disgruntled ex-employees, or current employees who have ulterior motives? What if one of our partners or vendors decides to steal data from us on purpose?These are valid instances of insider threat, but they aren’t the only ones. And, in fact, the unintentional insider threat can be equally risky to the organization and is unfortunately quite common, accou ...
Follow
1463
6 Security Podcasts You Should Be Listening to Now
We're addicted to podcasts. These days there is such a broad range of really good cybersecurity content available in podcast form (for free might we add), that it's hard to pick just one! We polled our internal security experts to find out their favorites, and here’s what they recommend you tune into!Continue Reading
Follow
589
Chip Vulnerability Opens Companies to Security Risks
Yesterday we learned about two hardware bugs dubbed Meltdown and Spectre that allow normal, low privileged user programs such as database applications or JavaScript in web browsers to access what the kernel memory has been designed to hide.As patches are becoming available, organizations will experience a massive impact on performance. Even worse is the security risk associated with the business’s now publicly exposed information.Continue reading...
Follow
446
2018 Cybersecurity Predictions
It’s the first week of 2018, and we can’t help but reflect on all the security news that has unfolded over the last year. As we noted in our post last week, The 5 Biggest Data Breaches of 2017, it seems like countless top-name organizations fell victim to massive data breaches – whether due to malicious hackers or to naïve users who unknowingly helped attackers. It’s important that companies take the proper steps and implement effective processes to help prepare for, mitigate, ...
Follow
738
The 5 Biggest Data Breaches of 2017
From Vault 7 to WannaCry to Equifax, we’ve seen large scale security incidents in the last year that have left sensitive data exposed. Malicious hackers have found new ways to compromise classified systems and information, and naïve users continue to put organizations at risk. As we wrap up 2017, we wanted to reflect on this year's biggest security breaches in the hopes that history does not repeat itself.Check out our look back at the top 5 cybersecurity events that have unfolded t ...
Follow
382
The Insider Threat that Took Down the Death Star
Forces of stormtroopers, councils of Jedi, and squadrons of alliance pilots will flock to theaters to watch the latest installment in the Star Wars series – The Last Jedi. Fans will light up the internet with blogs, fan fiction, speculation, and analysis of every frame of the movie.Cybersecurity experts are no different. With each addition to the expanding Star Wars movieverse, IT security bloggers use the Galactic Empire (now the First Order) and the Rebel Alliance as analogs for compani ...
Follow
494
Insider Threat Management Trends
Gatepoint Research recently surveyed more than 100 executives in IT and security roles to understand trends in insider threat management (details of survey responder roles, industries and firm size is included at the end of this post).So what did we learn from the survey? The findings demonstrate organizations’ concerns about insider threats, particularly data exfiltration. The research also sheds light on the challenges organizations face in mitigating these threats. See the results…

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel