Amazon Discloses Security Incident Involving Customers’ Email Addresses

Amazon Discloses Security Incident Involving Customers’ Email Addresses

Amazon informed some of its customers about a security incident that involved the unauthorized disclosure of their email addresses. News of the security incident emerged over the weekend of October 23 when ...
Report: Nashville company pays ex-employee ransom installments only to stall him until the cops make the bust

Report: Nashville company pays ex-employee ransom installments only to stall him until the cops make the bust

A global phone insurance and tech support company headquartered in Nashville, Tennessee has resorted to paying ransom to an alleged ex-staffer after receiving emails claiming he stole private info of thousands of ...
Threatbusters thumbnail

Prying Eyes Inside the Enterprise: Bitglass’ Insider Threat Report

When words like cyberattack are used, they typically conjure up images of malicious, external threats. While hackers, malware, and other outside entities pose a risk to enterprise security, they are not the ...

Vulnerabilities in SSD Encryption: Using osquery to Identify Vulnerable Windows Machines

| | Insider, osquery
Dark Reading and Forbes, among various other sources, have recently reported that Windows computers using the hardware encryption feature of many different types of solid-state drives (SSDs) are vulnerable to attacks that ...

The Ins and Outs of Insider Threats

| | CASB, Insider, UEBA
Insider threats are among the leading causes of breaches. As they involve the usage of legitimate corporate credentials to access enterprise resources (AWS, Office 365, Salesforce, and others like them), they are ...

Research Report Evaluates Osquery’s Role in Upending Endpoint Security [Complimentary Copy]

| | Insider, open source, osquery
451 Research, a global research advisory firm, recently published their first market insight report covering osquery. The report, “Uptycs emerges from stealth betting on SQL-based osquery for upending endpoint security” acknowledges the ...

The Top 5 Insider Threat Behaviors You Need to Monitor

Have you overlooked insider threats in your organization? It’s probably time to take a hard look at this area. Believe it or not, insider threats often pose a greater threat to the ...