Blog

Retaining security talent by embracing distributed team management

Published on February 22, 2016

Ask anyone in a security leadership role about their team and you’ll likely find that the great majority are struggling. They are struggling because finding security talent is increasingly hard and keeping that talent is even harder. This is one of the key reasons many organizations are embracing a distributed...

How to convince the CFO of the budgetary security need

Published on February 12, 2016

It had been custom for organizations to think of cybersecurity in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of sensitive personal, financial, and intellectual property-related data, it became clear that this...

Why I Joined Securonix

Published on February 4, 2016

I decided to join Securonix in January, 2016. Like any career change, I made this one with as much care and diligence as possible. This isn’t my first security startup rodeo; I’ve been helping to build security companies for almost 20 years and I have been lucky enough to be...

EU Gets Serious About Cyber Security

Published on January 21, 2016

By Brian Contos, VP & Chief Strategy Officer, Securonix In a vote of 34 to 2, European Union rules regarding cyber security for critical services such as energy, finance, healthcare and even online services have been informally agreed on and are ready for endorsement by the Council and the full...

Encryption Debate

Published on December 17, 2015

The encryption debate keeps raging on And while its entertainment value cannot match Republican presidential debate, both sides mean well and bring up compelling (for each side) arguments. Technical aspect of this debate is interesting, and political one is unavoidable, but as FBI director James Comey said at a Senate...

Insider Attacks Were the Most Costly Breaches of 2015

Published on October 7, 2015

Insiders pose tremendous risk to organizations, according to the most recent Ponemon Report. Malicious insiders were not the most common source of attacks last year, but they were the most costly. According to 2015 data, insider attacks cost companies about $144,000 per incident. Containing and resolving the complexities associated with...

Cleanup on Aisle IPO – Reacting to an impulsive insider threat

Published on August 14, 2015

An email mistakenly sent to the wrong employee provided the basis for a frantic incident response to a possible insider threat at the corporate headquarters of one of the largest fitness companies in the United States, just days before their IPO that raised over 200 million USD. A payroll manager...

Inside the Ashley Madison Breach

Published on July 31, 2015

Motivations and insider factors 37 million users may have their personal data at risk as a result of this latest data breach.   There are many factors to this breach that seem different than others that we have previously seen. With most data breaches customers are pursuing legal counsel, speaking to...

Behavior Analytics takes center stage in DC

Published on July 28, 2015

Securonix was recently invited as an ICIT fellow and industry leader to participate in an advisory meeting with senate staffers on the benefits of Behavior Analytics and to help describe the extensive ways in which it can be leveraged for insider and cyber threat detection and risk reduction. As we...

A Case of Corporate Espionage

Published on July 10, 2015

In May of 2015, two employees were accused of stealing trade secrets from two U.S tech companies named Avago and Skyworks. The attackers collaborated for years on how to obtain the data needed to stand up their own company in China to compete in the billion dollars a year business....