Ga onbeperkt met Magzter GOLD

Ga onbeperkt met Magzter GOLD

Krijg onbeperkte toegang tot meer dan 9000 tijdschriften, kranten en Premium-verhalen voor slechts

$149.99
 
$74.99/Jaar

Poging GOUD - Vrij

Evolving Face Of Insider Threat

Enterprise IT World

|

January 2018

LALIT CHACKO

GM – IT INFRASTRUCTURE & SECURITY OPERATIONS, IBM INDIA

“It’s time the CIOs, CTOs, CISOs take cognizance of the lurking insider threat from a growing workforce which is, complacent, inept, ignorant, averse to change, working in silos and apathetic to the management”

Evolving Face Of Insider Threat

Technology, process and policies have evolved to counter Insiders threats in organizations to a large extent but the new age threats from complacent, ineptitude, ignorant, change averse teams that work in silos and management apathy that builds such environments might still jeopardize them.

Following are a couple of definitions of ‘Insider Threat’ from globally well-known and trusted knowledge sources. (Wikipedia) - ‘An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems” (CERt.org) - “Insiders pose a substantial threat to your organization because they have the knowledge and access to proprietary systems that allow them to bypass security measures through legitimate means. “

Do these definitions cover the entirety of insider threat? Is insider threat limited to insiders with knowledge and access?

NOT at all, It’s time that the management particularly the CIOs, CTOs, CISOs take cognizance of the lurking insider threat not because of “who have inside information” or “malicious intent” or “knowledge and access to proprietary systems” but a growing workforce which is, “complacent, inept, ignorant, averse to change , working in silos and apathetic to the management”.

MEER VERHALEN VAN Enterprise IT World

Enterprise IT World

Enterprise IT World

SecurityScorecard Exposes Global ASUS Router Hijack "WrtHug" With Suspected China Links

SecurityScorecard's STRIKE threat intelligence team, working with ASUS, has uncovered Operation WrtHug- a sophisticated global espionage campaign hijacking thousands of ASUS home and SOHO routers to create covert relay nodes across Asia, the US, and Europe.

time to read

1 min

November 2025

Enterprise IT World

Armis Raises $435 Million Pre-IPO Funding, Valued at $6.1 Billion

Armis, the global leader in cyber exposure management, has secured US$435 million in pre-IPO funding, boosting its valuation to US$6.1 billion.

time to read

1 min

November 2025

Enterprise IT World

Enterprise IT World

Paytm Bets on AI in Travel with Launch of 'Paytm Checkin'

Paytm (One 97 Communications Limited), India's leading digital payments and financial services company, has unveiled Paytm Checkin, an Al-powered travel app designed to transform trip planning and booking through conversational intelligence and personalization.

time to read

1 min

November 2025

Enterprise IT World

Enterprise IT World

FROM AGENTIC AI TO INCLUSIVE GROWTH: IFTA UNVEILS FINTECH TRENDS 2026 AHEAD OF 10TH ANNUAL INDIA FINTECH FORUM

The 10th edition of the India FinTech Forum (IFTA) spotlights Agentic AI, embedded finance, democratization of wealth, cyber resilience, and fintech for Bharat as the key trends shaping India's financial future. The event, to be held on December 10, 2025, in Mumbai, will also honour disruptive fintech startups transforming the BFSI landscape.

time to read

4 mins

November 2025

Enterprise IT World

Enterprise IT World

INDIA'S DPDP ACT: A NEW ERA FOR DATA PRIVACY AND DIGITAL TRUST

The Digital Personal Data Protection Act, 2025 sets a clear framework for consent, accountability, and governance-reshaping how businesses handle personal data in an Al-driven economy.

time to read

3 mins

November 2025

Enterprise IT World

Enterprise IT World

TIRED OF SPAM CALLS? HOW THE DPDP RULES, 2025 PUT YOU BACK IN CONTROL. THE DAILY NUISANCE WE ALL KNOW

The Digital Personal Data Protection Act, 2025 sets a clear framework for consent, accountability, and governance-reshaping how businesses handle personal data in an Al-driven economy.

time to read

4 mins

November 2025

Enterprise IT World

Enterprise IT World

CyberArk Launches Free TLS Certificate Scan Tools to Help Businesses Prevent Outages and Rising Labor Costs

CyberArk has unveiled two free tools -the TLS Certificate Renewal Impact Calculator and TLS Certificate Discovery Scan to help organizations prepare for a seismic shift in certificate management.

time to read

1 min

November 2025

Enterprise IT World

Enterprise IT World

Consistent Infosystems to Showcase Advanced Surveillance Technologies at IFSEC India 2025

Consistent Infosystems, one of India's fastest-growing IT hardware and security technology brands, is gearing up for a strong presence at IFSEC India 2025, scheduled from 11-13 December at Pragati Maidan, New Delhi.

time to read

1 min

November 2025

Enterprise IT World

Enterprise IT World

Lenovo India Surges to USD 1.2 Billion Quarterly Revenue, Fueled by Al and Digita Infrastructure Demand

Lenovo India has delivered a landmark performance in Q2 FY25/26, posting USD 1.2 billion in revenue-an impressive 23% year-on-year growth-marking one of its strongest quarters to date.

time to read

1 min

November 2025

Enterprise IT World

CyberArk's New TLS Tools Signal a Turning Point in Automation and Risk Management

As TLS certificate lifespans shrink dramatically-from 398 days today to just 47 days by 2029-automation is no longer optional; it's mission-critical for business continuity.

time to read

1 min

November 2025

Translate

Share

-
+

Change font size