Follow ObserveIT on their other social channels!
About Us
Company Size:
51-200 employees
Company Type:
Boston, MA. USA
ObserveIT is a user monitoring and investigation solution that identifies and eliminates insider threats. It continuously monitors user behavior and alerts IT and Security teams about activities that put their organizations at risk. ObserveIT provides comprehensive visibility into what all users are ...
Read more
Promoted Content
[ebook] Insider Threat Program: Your 90-Day Plan
Chip Vulnerability Opens Companies to Security Risks
Yesterday we learned about two hardware bugs dubbed Meltdown and Spectre that allow normal, low privileged user programs such as database applications or JavaScript in web browsers to access what the kernel memory has been designed to hide.As patches are becoming available, organizations will experience a massive impact on performance. Even worse is the security risk associated with the business’s now publicly exposed information.Continue reading...
2018 Cybersecurity Predictions
It’s the first week of 2018, and we can’t help but reflect on all the security news that has unfolded over the last year. As we noted in our post last week, The 5 Biggest Data Breaches of 2017, it seems like countless top-name organizations fell victim to massive data breaches – whether due to malicious hackers or to naïve users who unknowingly helped attackers. It’s important that companies take the proper steps and implement effective processes to help prepare for, mitigate, ...
The 5 Biggest Data Breaches of 2017
From Vault 7 to WannaCry to Equifax, we’ve seen large scale security incidents in the last year that have left sensitive data exposed. Malicious hackers have found new ways to compromise classified systems and information, and naïve users continue to put organizations at risk. As we wrap up 2017, we wanted to reflect on this year's biggest security breaches in the hopes that history does not repeat itself.Check out our look back at the top 5 cybersecurity events that have unfolded t ...
The Insider Threat that Took Down the Death Star
Forces of stormtroopers, councils of Jedi, and squadrons of alliance pilots will flock to theaters to watch the latest installment in the Star Wars series – The Last Jedi. Fans will light up the internet with blogs, fan fiction, speculation, and analysis of every frame of the movie.Cybersecurity experts are no different. With each addition to the expanding Star Wars movieverse, IT security bloggers use the Galactic Empire (now the First Order) and the Rebel Alliance as analogs for compani ...
Insider Threat Management Trends
Gatepoint Research recently surveyed more than 100 executives in IT and security roles to understand trends in insider threat management (details of survey responder roles, industries and firm size is included at the end of this post).So what did we learn from the survey? The findings demonstrate organizations’ concerns about insider threats, particularly data exfiltration. The research also sheds light on the challenges organizations face in mitigating these threats. See the results…
Is Traditional DLP Dying?
For years, Data Loss Prevention (DLP) has been the first line of defense against data leaving the organization’s four walls. DLP attempts to classify data, track data, and prevent it from going leaving the organization via unauthorized channels. Research shows that successful DLP implementations are very rare. Organizations continue to struggle with heavy DLP agents on the endpoint, the time consuming data classification process, ongoing maintenance, and disconnects between data owners and DLP ...
7 Steps to Protect Your Data from Insider Threats
Like it or not, your greatest risk already has access to your critical data and systems and it comes from your employees, privileged users and authorized vendors. When trusted users with access to key systems and data are careless, become compromised, or have malicious intent, confidential, proprietary data can quickly become exposed.Detecting insider threats, however, can be challenging for organizations due to the combination of limited, or no, visibility into user activities. Since privileged ...
Mr. Robot Hacks and How to Prevent Them
With season 3 of Mr. Robot coming back strong in its premiere, we took a closer look at some of Elliot’s hacking techniques. Hollywood films and TV shows are notorious for butchering how hackers really operate. Shows like CSI love to casually drop lines like “I’ll create a GUI interface using visual basic to track the killer’s IP address”. With so many shows and movies getting it wrong, Mr. Robot changed the game with its authenticity. Let’s take a look at some of Mr. Robot’s hacks ...
ObserveIT 7.1 is here!
ObserveIT 7.1 takes a big step forward in helping customers detect and prevent data exfiltration.   Many organizations manage confidential or proprietary data in systems accessed via a web interface such as Microsoft SharePoint, Box for Business, Google Suite, and other storage systems. Sensitive data is accessed daily from web/cloud applications such as Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), trading systems, health applications, and other busi ...
Mitigating the Dangers of Remote Login Accounts
by: Kevin Donovan When strengthening your insider threat security posture, it is crucial that third party access is not over looked. The term “insider” is defined as a current or former employee, contractor, or business partner who has or had authorized access to the organization’s network, systems, or data. An insider threat is when an insider intentionally or unintentionally misuses access to negatively affect the confidentiality, integrity, or availability of the organization’s cri ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge



Why Do You Need a VPN?
Views: 766 / January 21, 2018
How to Evade AV with OWASP-ZSC – Part 1
Views: 1061 / January 20, 2018
Tracking IP info with its Metadata
Views: 1868 / January 19, 2018
UNMASKED: Skygofree, FISA, and Google
Views: 1508 / January 19, 2018
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?