Vulnerabilities / Threats

8/17/2016
04:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail

8 Surprising Statistics About Insider Threats

Insider theft and negligence is real--and so are the practices that amplify the risks.
2 of 9

Sixty-nine percent of enterprise security executives reported experiencing an attempted theft or corruption of data by insiders during the last 12 months, according to Accenture and HfS Research.

Image Source: Accenture/HfS Research

Sixty-nine percent of enterprise security executives reported experiencing an attempted theft or corruption of data by insiders during the last 12 months, according to Accenture and HfS Research.

Image Source: Accenture/HfS Research

2 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
DLJ@HPE
50%
50%
[email protected],
User Rank: Author
8/26/2016 | 12:55:18 PM
A simple step to reduce the threat
Insider threats are much harder to detect and potentially much more damaging financially and reputationally than an external attack. Secure content management, which employs technology assisted capabilties to constantly scan, analyze and act to reduce the risk needs to be an essential part of every organizations data protection strategy.
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2638
PUBLISHED: 2018-07-16
It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
CVE-2017-7468
PUBLISHED: 2018-07-16
In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was...
CVE-2018-13387
PUBLISHED: 2018-07-16
The IncomingMailServers resource in Atlassian JIRA Server before version 7.6.7, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3 and from version 7.10.0 before version 7.10.2 allows remote attackers to inject arbitrary HTML or ...
CVE-2018-14071
PUBLISHED: 2018-07-16
The Geo Mashup plugin before 1.10.4 for WordPress has insufficient sanitization of post editor and other user input.
CVE-2018-5229
PUBLISHED: 2018-07-16
The NotificationRepresentationFactoryImpl class in Atlassian Universal Plugin Manager before version 2.22.9 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of user submitted add-on names.