ShadowSight-Insider-Threat-Management-Logomenu icon

Archives

CATEGORIES

The Integral Role of Dashboards in Mitigating Insider Threats

December 18, 2023 by Christopher McNaughton
In the digital age, organisations are increasingly vulnerable to insider threats, a perilous…
Read More >

Safeguarding the vaults of national security: The case of Joshua Schulte, the ex-CIA software engineer

December 13, 2023 by Christopher McNaughton
In the shadowy realms of government, defence, and intelligence agencies, the protection of…
Read More >

Navigating the precarious terrain of insider risks in pharmaceuticals and biotechnology

December 11, 2023 by Christopher McNaughton
In the realms of Pharmaceuticals and Biotechnology, the brilliance of innovation is closely…
Read More >

Navigating the maze of insider risk: A strategic approach for CISO’s

December 6, 2023 by Christopher McNaughton
In the ever-evolving landscape of cybersecurity, Chief Information Security Officers (CISOs) find themselves…
Read More >

Redefining cybersecurity training - How insider risk detection is revolutionising employee awareness

December 4, 2023 by Christopher McNaughton
In the ever-evolving landscape of cybersecurity, traditional methods of employee training, such as…
Read More >

In-depth analysis of insider risks in defence and intelligence industries

November 29, 2023 by Christopher McNaughton
In the ever-evolving landscape of national security and defence, organizations operating within high-stakes…
Read More >

The Pentagon leak case of 2023: A lesson in insider risk management

November 27, 2023 by Christopher McNaughton
In early 2023, the Pentagon faced a significant security breach, a stark reminder…
Read More >

NHS data breach: A case for strengthening insider risk monitoring with ShadowSight

November 22, 2023 by Christopher McNaughton
In February 2023, the National Health Service (NHS) experienced a significant data breach.…
Read More >

Analysing the Twilio data breach of 2023: A case study in insider risk and social engineering

November 20, 2023 by Christopher McNaughton
The Breach In mid-2023, Twilio, a major player in cloud communications, suffered a…
Read More >

The Ubiquiti data theft: A case study in insider risk and the necessity of vigilant monitoring

November 15, 2023 by Christopher McNaughton
Introduction to the Ubiquiti Data Theft Incident In the dynamic world of network…
Read More >