The CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.
A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop
When it comes to sensitive data, your employees may be sharing more than you think. Information that falls into the wrong hands- whether unintentional or with malicious intent, can cause significant harm to a company. Implementing and
The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen, after a judge asked the government to disclose the hacking technique it used to gather...
The risk of malicious activity has never been more of a reality for organizations. End users today access, process, and manage privileged data more than ever as part of their job. This need for employees to use privileged data puts
Since the dawn of shared computing people have pushed to expand the envelop of productive group thinking. What once took an army of engineers and mathematicians a week to compute could be done in minutes, then in seconds, then in