border device CBP Loses Photos

Federal Appellate Court Approves ‘Pretext’ Border Search

For almost nine years, Chinese national and U.S. resident Haitao Xiang had been employed by the Monsanto company in St. Louis, Missouri, as a research application engineer specializing in hyperspectral imaging technology ...
Security Boulevard
Risk Intelligence Index: The April 2023 Cyber Threat Landscape

Risk Intelligence Index: The April 2023 Cyber Threat Landscape

Flashpoint’s monthly look at the cyber risk ecosystem affecting organizations including ransomware, vulnerabilities, and insider threats. The post Risk Intelligence Index: The April 2023 Cyber Threat Landscape appeared first on Flashpoint ...

Insider Risk Detection 101: Mitigating Unintentional Insider Threats

When most people think of the insider threat, they think of that picture-perfect stock image of a man in a hoodie hunched menacingly over his laptop. The post Insider Risk Detection 101: ...
Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials

Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials

2022 has been an auspicious year for threat actors and Advanced Persistent Threat (APT) groups targeting Australia, with adversaries stealing over 50 million credentials and personal information—a 99 percent increase compared to ...
Risk Intelligence Index: Cyber Threat Landscape By the Numbers

Risk Intelligence Index: Cyber Threat Landscape By the Numbers

Flashpoint's monthly look at the cyber risk ecosystem affecting organizations around the world, including intelligence, news, data, and analysis about ransomware, vulnerabilities, insider threats, and high-profile cybercriminals The post Risk Intelligence Index: ...
“Protect Your Business from Within: Guard Against Insider Threats”

“Protect Your Business from Within: Guard Against Insider Threats”

Introduction According to recent research, the cost of each incident has increased by 44% and is now $15.38 million. The primary focus is on credential theft, which has increased by a startling ...

The Hidden Costs of Insider Threats

Much of cybersecurity policy and practice is dedicated to protecting against external threats and attacks that put networks, data, and devices at risk. Malicious incidents of hacking, phishing, and the like from ...
Should we care about the theft of one dollar?

Should we care about the theft of one dollar?

By deploying user journey analytics, the insurance company would have seen instances of anomalous behavior for the employee crediting $1 to their account. The post Should we care about the theft of ...
Flashpoint Year In Review: 2022 Insider Threat Landscape

Flashpoint Year In Review: 2022 Insider Threat Landscape

To increase their chances of success, threat actors will often seek the aid of disgruntled, or malicious employees within the organizations they are targeting. After all, why waste resources navigating through security ...
Digital Transformation Leaving Organizations More Vulnerable

Insider Risks Hamper the Digital Transformation Process

Digital transformation is the way forward for today’s work environment. “Digital transformation and pursuing a cloud-first strategy is what makes business become more agile, allowing you to deliver more value to customers ...
Security Boulevard