Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts125/v4/2b/57/a5/2b57a5d8-f602-effe-5b02-e13089082d71/mza_9689764317764868015.jpg/600x600bb.jpg
Veriato Insider
Veriato
33 episodes
3 days ago
The Insider Podcast focuses on the latest cybersecurity news, trends, and features in the market today. Join us as we talk to experts in the cybersecurity industry from all over the world. In this podcast series, you'll learn about real-world cybersecurity scenarios and solutions from leaders in a multitude of organizations.
Show more...
Tech News
News
RSS
All content for Veriato Insider is the property of Veriato and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Insider Podcast focuses on the latest cybersecurity news, trends, and features in the market today. Join us as we talk to experts in the cybersecurity industry from all over the world. In this podcast series, you'll learn about real-world cybersecurity scenarios and solutions from leaders in a multitude of organizations.
Show more...
Tech News
News
Episodes (20/33)
Veriato Insider
Insider Risk Looms the Manufacturing Industry: Tips to Mitigate

The rising adoption of digital processes in manufacturing has fundamentally changed how this sector does business. The increased reliance on digitization and network connectivity has sharpened the risks of company data exfiltration, intellectual property damages, and more, especially those stemming from insiders. Insider threat actors operate from a position of trust that allows them to circumvent security and evade detection for months, if not years.

Manufacturing ranks among the top five industries with the highest reported insider breaches and privilege misuse. In Verizon's Data Breach Investigations Report, nearly 40% of the cybersecurity incidents in manufacturing traced to insiders, including partners and third-party vendors. The same report outlined 57% of database breaches to an insider within the organization.

According to a CISA report, the manufacturing sector reported the highest number of insider attacks among companies in the critical infrastructure sector. These incidents can be perpetrated by employees of all ranks, contractors, third-party vendors, and partners resulting in severe damages to businesses of all sizes. IBM's annual Insider Threat report estimates the average cost of insider attacks rose by 31% in 2020 to $11.45 million from the previous two years, and the number of insider incidents climbed by 47%.

Insider security breaches in manufacturing are now an impending reality requiring companies to safeguard themselves. This article dives deeper into the dynamics and challenges leading to the rise of insider incidents in manufacturing and ways to mitigate those.

Show more...
3 years ago
17 minutes 4 seconds

Veriato Insider
Insider Threats in Healthcare and Tips to Mitigate

Research data shows insider threat is a dominant risk in the healthcare industry. According to the 2019 Verizon Insider Threat Report, insider threats affected 46% of healthcare organizations. Healthcare is the only industry where insiders were responsible for a higher percentage of breaches than external threat actors (Figure 1). In addition to healthcare staff, contractors, executives, and former employees collectively contribute to the problem.

Show more...
3 years ago
25 minutes 1 second

Veriato Insider
Combating Social Engineering Threats Through Insider Threat Management

Social engineering is an insidious way of getting "insider access" into an organization's network and data. Threat actors use it to gain sweeping access to carry out sophisticated attacks while evading detection. This "insider" leeway of social engineering makes it an alarming threat that cybercriminals are routinely exploiting now more than ever.

Show more...
3 years ago
19 minutes 59 seconds

Veriato Insider
Combating Insider Threats in Remote Learning Environments Introduction

Remote learning is now an inevitable reality for academic institutions. Even before the pandemic, remote learning was on the rise. The pandemic has only made that trend more pervasive and dominant across institutions, most notably among the public schools.

The Multi-State Information Sharing and Analysis Center (MS-ISAC), a federally funded threat intelligence and cybersecurity advisory organization, recorded a 19% increase in cyberattacks targeting K-12 schools in the 2019-2020 school year. Based on the rising trends of alerts from the academic sector, MS-ISAC projects the number of cybersecurity incidents targeting institutions to jump by 86% in the upcoming academic year.

Show more...
3 years ago
23 minutes 1 second

Veriato Insider
How Insider Threats Impacts the Financial Sector and Tips to Mitigate

Nowadays, financial institutions are the custodians of more than just money. They are also keepers of sensitive personal and financial data. As the financial sector leans more towards the cloud and other digital technologies, this data is exposed to cybersecurity threats

Show more...
3 years ago
16 minutes 26 seconds

Veriato Insider
Leveraging National Cybersecurity Awareness Month to Reduce Insider Threats

October is a month that generates much buzz amongst the cybersecurity community. It’s National Cybersecurity Awareness Month (NCSAM) – a time when security professionals work around the clock to raise awareness of growing cyber risks amongst general user communities.

Show more...
4 years ago
17 minutes 38 seconds

Veriato Insider
Veriato Podast 2021 - 8

Ransomware has become an annual event for many organizations, costing them millions in lost productivity and revenue. While there have been some notable successes in fighting off this threat, the industry as a whole must continue strengthening its resolve in order to safeguard against future attacks. Part of this can come down to recognizing the role that users and employees play in fighting off these attacks and providing them with info and tools they need to help reduce risks.

Show more...
4 years ago
14 minutes 42 seconds

Veriato Insider
The Impact of Ransom Attacks on Supply Chains and Risk to 3rd Parties

This podcast is brought to you by Veriato.com. Today, Michael Owens, the Business Information Security Officer at Equifax, joins Dr. Christine Izuakor to discuss the risk that ransom attacks on a service providers such as Kaseya can have on their downstream client organizations.  

The Kaseya ransomware attack is an eye-opener of sorts. The rising success of ransomware attacks lies in bringing business operations to a grinding halt. In attacks similar to Kaseya, several downstream organizations are forced to stop their operations. The recovery period runs into several days, if not weeks. 

Whatever be the size of your company, today, every organization has to rely on third-party solutions and personnel. As supply-chain exploits keep rising, the question that looms large for security leaders is "how to keep organizations safe in an era of Kaseya and Solarwinds attacks"?

Show more...
4 years ago
21 minutes 22 seconds

Veriato Insider
The Current State of Ransomware: 2021 Edition

In 2020, ransomware attacks increased by 150% from the previous year, and ransom payments grew by 200%. That trend is up in 2021. Within the first six months of this year, many high-profile ransomware attacks targeting critical infrastructure, municipalities, financial institutions, healthcare, and other businesses have hit the headlines. The impact of these attacks spans beyond the victim enterprise, affecting their ecosystem of partners, supply-chain, customers, and even the government.

Show more...
4 years ago
20 minutes

Veriato Insider
Learning From The Most Concerning Data Breaches Of 2021 So Far

The escalation in cybersecurity breaches as seen in 2020 has continued well into 2021. According to Verizon’s 2021 DBIR, so far they have looked into 29,207 incidents worldwide. These incidents boiled down to 5,258 confirmed data breaches. An analysis of these breaches shows:

  • 85% of breaches involved a human element.
  • 61% of breaches involved credential data.
  • 10% of breaches involved ransomware, double the previous year.
  • Cloud-hosted assets were compromised more than on-premises assets.

Many of these breaches were financially motivated, targeting sensitive data that can be easily monetized and lucratively too.

Human negligence, consistent with previous years, was the biggest threat to security. Cybercriminals are heavily exploiting social engineering tactics to gain a foothold in enterprise infrastructure. The human factor, intentional and otherwise insider threats, needs serious attention.

Show more...
4 years ago
21 minutes 42 seconds

Veriato Insider
Navigating Cybersecurity Tool Fatigue & Picking the Right Insider Threat Detection Solution

With so many new vendors pitching "Insider Threat Detection", how do you separate marketing fluff from reality? Join us in our latest Podcast as we discuss selecting the right tool for your unique business needs.

Show more...
4 years ago
21 minutes 44 seconds

Veriato Insider
How Insider Threats and the Dark Web increase Remote Work Risks for Organizations

In our latest podcast, we take a deep dive into the gloomiest part of the internet, the “Dark Web” as we try to demystify everything we think we know. This is the realm of internet land where criminals and offenders can be found lurking around every corner. Though there is some truth to this perception, there are also many misconceptions about the Dark Web and its role in the security or insecurity of businesses. Join Dr. Christine Izuakor and a special guest from Equifax, Dr. Michael Owens as we unravel the Dark Web.

Brought to you by www.veriato.com

Show more...
4 years ago
26 minutes 3 seconds

Veriato Insider
Revisiting 5 Concerning Cyber Trends And Statistics Over The Past Year

In our latest podcast, we discuss 5 of the most concerning trends and statistics over the past year. Join Dr. Christine Izuakor and Frank McGovern, Cybersecurity Architect as they discuss various cybersecurity topics such as the rise of internal threat actors, security and awareness training, and addressing the human element.

Show more...
4 years ago
15 minutes 10 seconds

Veriato Insider
Utilizing Employee Monitoring Software For Operational Efficiency And Data Security

Join us in our latest episode hosted by Christine Izuakor and Anthony Lauderdale, Head of Cyber Defense at Zoom, as we discuss the evolution of Employee Monitoring Software, and how the technology can be utilized to increase operational efficiency and data security in the new remote world. We also discuss  Insider Threat Detection and how employees could be influenced by financial data to exfiltrate intellectual property.

Show more...
4 years ago
18 minutes 24 seconds

Veriato Insider
Extending CyberSecurity Beyond The Office Perimeter

A typical company has various cybersecurity measures in place to make sure all data is secure while employees are at the office. But the Pandemic changed that so how have companies extended those same measures beyond the office into the home? Listen to our latest Podcast with Dr. Christine Izuakor as we discuss.

Show more...
4 years ago
18 minutes 22 seconds

Veriato Insider
CyberSecurity Priorities To Focus On In 2021

The 2020 pandemic resulted in significant challenges to health, wealth, business, and cybersecurity. The early part of the year saw a rapid movement to a remote workforce. According to Gartner, 88% of companies sent their workforce home to work during the height of the pandemic. This remote work environment is continuing for many organizations in 2021.

Show more...
4 years ago
21 minutes 14 seconds

Veriato Insider
Managing Security And Compliance In A Remote World

The COVID-19 pandemic has had serious repercussions on the global economy and has also forced millions to work remotely from their homes. According to analyst firm Gartner Inc., amid Covid-19, 88% of enterprises shifted to remote working for their employees. And, this Work From Home (WFH) isn't going away in the foreseeable future. With companies such as Deutsche Bank now offering long-term WFH to all employees until July 2021. So how do we continue to manage security and compliance in this new remote world?

Show more...
5 years ago
14 minutes 45 seconds

Veriato Insider
User Behavior Analytics & The Zero Trust Approach

Join us as we discuss a zero-trust approach to cybersecurity, starting with User and Entity Behavior Analytics.

Show more...
5 years ago
16 minutes 59 seconds

Veriato Insider
Using AI To Detect And Prove Sticky HR Related Issues

Regardless of size, all companies will need to conduct an employee investigation in some shape or form. The key is having a reliable set of data to prove indisputable innocence or guilt. Join Cybersecurity expert, Dr. Christine Izuakor and Intelligence expert, Virgil Capollari as they discuss this topic in detail.

Show more...
5 years ago
15 minutes 19 seconds

Veriato Insider
The New Norm In Cybersecurity

Companies will need to permanently account for securing remote workers whether they want to or not. This is the new norm. Join Christine Izuakor and Rolando Lopez as they discuss the measures companies are taking to fully ensure that their company's data is secure both in the office and at home!

Show more...
5 years ago
21 minutes 32 seconds

Veriato Insider
The Insider Podcast focuses on the latest cybersecurity news, trends, and features in the market today. Join us as we talk to experts in the cybersecurity industry from all over the world. In this podcast series, you'll learn about real-world cybersecurity scenarios and solutions from leaders in a multitude of organizations.