Insider threats identified in all customer environments

Insider threats identified in all customer environments

Insiders are a great risk to company data, seeing as they are trusted with sensitive information, but they are often undetected. The latest Imperva Hacker Intelligence Initiative Report, ‘Insiders: The Threat is Already Within’, found that 100% of customer environments contained insider threats.

These insider threats were categorised as compromised insiders, negligent and careless insiders, and malicious insiders. The security currently implemented did not find any threat incidents, despite the fact that the security infrastructure seemed appropriate.

In the majority of cases, insiders took more advantage of trusted access to data than attempts to directly hack file shares and databases.

Behaviour analytics and deception technology has resulted in more insider threats being recognised. Deception technology provided value in the study through uncovering anomalies that indicated compromised user credentials and end points. Machine learning assessed detailed data activity evaluated by insiders.

Imperva CTO and co-founder, Amichai Shulman, said:

“Just finding anomalies in user behaviour will not solve the insider threat problem. Enterprises need to have granular visibility into which users are accessing data, and more importantly, the actual queries and data accessed by each user. This deep level of insight proved critical to separating actual incidents from anomalies.”

It is difficult for companies to deal with such threats when their security infrastructure is solid, but systems are only as effective as the personnel assigned to deal with them. UK firms would be wise to offer cyber security jobs to the new breed of cyber crime fighters trained in identifying all kinds of threat, including those coming from the inside.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • RANT Events
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy