Insider Threat

Free Download

Want to know more about Insider Threat Mitigation? Download our Insider Threat Capabilities Brief [PDF, 708KB]

Considering an Insider Threat Mitigation partner? Contact us to find out more about Tanager’s approach.

Insider Threat News

This RSS feed URL is deprecated

06/20/2018This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Tesla's Tough Lesson on Malicious Insider Threats - Infosecurity Magazine

06/19/2018

Infosecurity Magazine

Tesla's Tough Lesson on Malicious Insider Threats
Infosecurity Magazine
The potential damages a company can suffer from malicious insiders became a harsh reality for Tesla CEO Elon Musk, who expressed his disappointment at learning he had a saboteur within the Tesla ranks. The individual who allegedly engaged in ...
Tesla Employee Steals, Sabotages Company DataDark Reading
Following Tesla's saboteur discovery, is AI the answer to corporate sabotage?Verdict

all 469 news articles »

Monday, June 18: Dtex, Insider Threats in the News: Elon Musk Says Insider Sabotaged Tesla; US Inspector General ... - Security Boulevard

06/19/2018

Monday, June 18: Dtex, Insider Threats in the News: Elon Musk Says Insider Sabotaged Tesla; US Inspector General ...
Security Boulevard
Today, CNBC broke the news that Tesla founder and CEO Elon Musk believes that an insider sabotaged Tesla by manipulating code in the Tesla Manufacturing Operating System and by exporting large amounts of user data to unknown third parties.

How Healthcare Organizations Can Stay on Top of Insider Threats - HealthTech Magazine

06/18/2018

How Healthcare Organizations Can Stay on Top of Insider Threats
HealthTech Magazine
Healthcare is the only industry where insider threats are greater than threats from the outside. This is according to the recently released 2018 Data Breach Investigations Report (DBIR) by Verizon, which noted the prevalence of human error as well as ...

Consider these three things when developing an insider threat program, experts say - FedScoop

06/13/2018

FedScoop

Consider these three things when developing an insider threat program, experts say
FedScoop
The first step is to develop an understanding of what your agency's high-value assets are, said Michael Theis, the chief counterintelligence expert and technical lead for Carnegie Mellon's insider threat research program. The reality, Theis said, is ...

How can an insider threat interact with HIPAA regulated information? - DOTmed.com

06/19/2018

DOTmed.com

How can an insider threat interact with HIPAA regulated information?
DOTmed.com
The human factor is unpredictable and a key factor to insider threats. IBM stated in 2014 that human error is a contributing factor to 95% of data security events. For most healthcare entities, experiencing an insider attack equates to a data breach or ...

Two Critical US Dams at High Risk From Insider Cyber Threats - IEEE Spectrum

06/15/2018

IEEE Spectrum

Two Critical US Dams at High Risk From Insider Cyber Threats
IEEE Spectrum
The Interior Department's Inspector General released a report (pdf) this week stating that two of the dams' industrial control systems, while seeming secure from being attacked remotely, operate “at high risk from insider threats.” The report, which ...

The above news articles are derived from the Google News feed for “Insider Threat”.
Tanager, Inc. provides this information here in accordance with our Terms of Use policy.

Now Hiring!

Tanager is a leader in providing innovative solutions in areas of Information Technology, Cyber Security, and Insider Threat Mitigation. Search our database of open positions or submit your application for consideration. We want to hear from you.