Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Insider Threats in Cybersecurity

When you think about security, it's usually from external factors. We lock the doors to our homes and businesses, when we go to the gym our belongings are kept safe in locked lockers from theft, and our computers and phones have security measures in place to keep people out. Our focus is on external threats but the biggest danger can come from within — insider threats. Consider the classic thriller When a Stranger Calls.

Top Insider Threat Software for Enterprises in 2026

Most insider threat programs start with the same question: What is a user doing? That is the right question to start with, but the wrong one to stop at. The more important question is what happened to the data. An employee who uploads a sensitive file to a personal Google Drive account at 11 p.m. the night before they resign is a clear signal. But what about the engineer who gradually copies source code fragments into a generative AI (genAI) coding assistant over three months?

Ekran System Partners with Hideez to Introduce Enhanced Authentication Functionality

Ekran System is partnering with Hideez to enhance the authentication process and improve user experience. As an alternative to two-factor authentication, our customers can now use a straightforward passwordless authentication method developed by Hideez. Thanks to this integration, you can streamline and consolidate logins for local desktops, remote desktop connections, virtual environments, and cloud infrastructures, while boosting your team’s efficiency and satisfaction.

Third-Party Security Risks: How to Mitigate Potential Cybersecurity Threats

Cooperation is the key to success, so working with third parties helps your organization increase efficiency, offer better products and services, employ highly qualified experts, and cut costs. But all these benefits come at the price of additional cybersecurity risks. Minor flaws in your third-party vendor’s security and privacy routines may lead to a breach in your organization’s cybersecurity.

USB Access Codes, Security Enhancements, and More! (v9.0.1)

CurrentWare version 9.0.1 is here! This update brings a streamlined Access Code Generator process for AccessPatrol, Bulk URL Reclassification for BrowseReporter and BrowseControl, and new security and quality-of-life updates to the CurrentWare Suite. As always, we recommend keeping your CurrentWare deployment up-to-date to take advantage of the latest functionality, stability, and security developments.

Data Anonymization: What It Is and 6 Best Practices You Should Know

Despite diverse protection measures applied by organizations, data breaches involving Personally Identifiable Information (PII) still cause substantial financial losses across various industries. Between March 2022 and March 2023, compromised customer and employee PII cost organizations $183 and $181 per record, respectively, according to the 2023 Cost of a Data Breach Report by IBM Security.

Engaging Insiders to Combat Insider Threats

Every IT and security leader loses sleep over insider threats. They’re notoriously difficult to detect, costly to mitigate and can lead to widespread loss and reputational damage. Despite efforts to mitigate insider threats, current global risks and economic pressure are fueling the flame. There’s no silver bullet for insider threat protection, however a greater focus on culture, engagement and empowerment can make a real difference.