Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Insider Threats: Ensuring Angry Employees and Innocent Do-Gooders Don't Derail Your Organization

Threats that arrive from outside an organization are difficult to deal with, but at least business leaders understand that they exist and prepare a proper defense. However, many managers don’t expect one of their employees to cause a problem from the inside. Sure, there will always be a worker who steals money from the cash register or walks out with a few reams of printer paper, but the true insider threat is much more dangerous. The U.S.

Ekran System Announces Integration with Venn to Enhance Remote Work Security

Ekran System announces its partnership with Venn, a provider of innovative solutions that secure remote work on any unmanaged or BYOD computer. Like Ekran System, Venn is recognized by many cybersecurity experts. It has also been named a Sample Vendor by Gartner. We hope this strategic partnership will mark a significant advancement in fortifying remote work environments against emerging cybersecurity threats.

How to Build an Insider Threat Program [10-step Checklist]

An effective insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to detect, deter, and respond to insider attacks is necessary for your organization to protect its sensitive data. It’s also required by many IT regulations, standards, and laws: NISPOM, NIST SP 800-53, HIPAA, PCI DSS, and others. In this article, we’ll shed light on the main insider threat program requirements and share the best tips on how to build an insider risk program.

How to Prepare for a PCI DSS Audit: 7 Key Steps You Should Follow

In the modern world, where financial transactions are increasingly conducted online, ensuring the security of sensitive financial information has become paramount. The Payment Card Industry Data Security Standard (PCI DSS) guides businesses worldwide towards the secure handling of payment card data. Compliance with PCI DSS not only protects your customers from potential data leaks but also safeguards your organization’s reputation and credibility.

Insights at Your Fingertips: Ekran System's Dashboards Update

Our team is constantly working on improving the experience for our customers and their end users. We are happy to announce that Ekran System has updated its Management Tool dashboards to make them even more well-structured and user-friendly. Read this five-minute post to discover our new dashboards.

The Hidden Danger - Understanding and Defending Against Insider Threats

Cyber threats do not always come from outside an organization. Insiders, including current and former employees, contractors and other business partners with authorized access to your network, systems or data can pose significant risk, damage your reputation or even cause financial losses and business disruption. Insider threat incidents are on the rise and organizations affected by them spend on average $15.4 million on mitigation efforts.

EP 34 - How to Catch a Malicious Insider w/ Eric O'Neill

Today’s episode of Trust Issues focuses on spycatching! Eric O’Neill, a former FBI counterintelligence operative and current national security strategist, joins host David Puner to discuss his legendary undercover mission to capture Robert Hanssen, one of the most notorious and damaging spies in U.S. history.

Major Supply Chain Cybersecurity Concerns and 7 Best Practices to Address Them

In today’s complex and interdependent world, it’s incredibly difficult to deliver a product or service without a supply chain. But this dependency creates additional risks – from reputational losses to major business disruptions. And with 62% of organizations being impacted by supply chain cyberattacks in 2021, mitigating risks created by third parties is extremely important.

Five Workforce Trends That Intensify Insider Threats

Insider threats don’t often seem like threats at all. They look like colleagues working diligently at the office, logging on to the corporate network from Starbucks or providing a critical third-party service. But insider threats are a big problem that’s getting even bigger and costlier to tackle.