While the rapid shift from office to home or remote-based activity has allowed work to continue, the idea that corporate assets are physically leaving the corporate space, and with them access to proprietary or sensitive data, could be a disaster if your security policies and practices are not adapting to this new norm. Now more than ever, companies need to be evaluating information technology and security practices surrounding insider threats.
Insider Threats aren’t just individual malicious employees. They may be anyone who had or has privileged access to the environment. From the vendor partner to the totally unwitting employee, the impact is the same.
Download a list of threat indicators to help you determine who is a high risk to your company.
Many information technology and security professionals are starting to adjust to the “new normal” of administering a remote workforce and subsequently monitoring for malicious activity of the increased attack surface.
This paper examines the illicit ecosystem for deep fakes.
Their technology evolution and migration paths from surface web to deep and dark sites, and uncover some of the actors creating and disseminating these videos. Nisos undertook research into deep fake technology (superimposing video footage of a face onto a source head and body) to determine if we could find the existence of a deep fake illicit digital underground economy or actors offering these services.
A true return on investment for network security