Ekran System Blog

News, opinions, and industry insights

July 25, 2017

A functional insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to prevent, detect, and remediate insider attacks and inadvertent data leaks by your own employees or subcontractors is a necessity for any organization that strives to reliably protect its own sensitive data.

How to build an insider threat program

Many companies...

June 22, 2017

Cyber security books nowadays are a dime a dozen. The topic is so popular, that it found a reliable foothold in modern day fiction, not to mention all the books detailing exploits of real-life hackers in the past turned security experts in the present.

Top 10 cyber security books

However, if you decide to dive past the purely entertainment products, you will find a slew of IT security books for experts that are extremely useful for building protection for your own...

May 24, 2017

Probably, everyone can agree that stopping insider threats is not an easy task.  Various insider threat indicators help you to know where the potential threat is coming from, but this is only half of the battle.

Insider Threat Indicators

Before we fully dive into this topic, it is worth noting that you need much more than simply watching human behavior to identify insider threat. Reliable detection also requires a specific tools that will allow...

April 19, 2017

High-profile cyber security incidents have always received major coverage by the media and attention from the public alike. The recent controversial and politically charged theft of emails from the Democratic National Committee is still a major topic of discussion, with investigations continuing at the highest levels.

Top security breaches

However, the history of cyber security incidents affecting private companies and government organizations...

April 10, 2017

Giving that authentication in general is the process of verification of that the user attempting to access certain end-points, data or functionality really is the person or entity they states to be, multifactor authentication is one of the general approaches or methods used to resolve this task.

Multi-factor authentication scheme

What is multifactor authentication and 2FA in particular?

What is NOT a two-factor...

Pages