Category: User Behavior

How to Apply FBI Insider Threat Warning to IT Security

Last month, Special Agent Scott Mahloch, weapons of mass destruction coordinator for the Chicago division of the FBI spoke at...
Read Now

BFFs: UEBA Threat Detection and Post Infection Prevention

I believe detection and prevention are the most chewed-over words in the security market. In the last 20 years, I...
Read Now

Five Common Misconceptions in Enterprise Security Organizations – Part Two

In my previous blog post (part 1), I talked about common misconceptions in Enterprise security organizations as they relate to IT security...
Read Now

End of SMS 2-Factor Authentication Opens Door for More Secure Authentication

There have been several articles in the last couple of days that talk about NIST’s latest Digital Authentication Guidelines (DAG)...
Read Now

Solving Important IT Security Problems with the Preempt Platform

“Being the founder of a startup is a very unnatural thing to do.” Those were the words of a board...
Read Now