GATEKEEPER BLOG

Drupal vulnerability - drupalgeddon2

When CMS Software Such as Drupal is a Threat

November 13, 2018

Sometimes, insider threats are less about people maliciously attacking your network but more about the software you install. Any type of software could have vulnerabilities including what would otherwise seem…

Read More
Advanced access control on need to know basis.

Understanding Permission Aggregation and Insider Threats

November 1, 2018

Insider threats are a growing concern for any large corporation.  In 2016, 40% of successful breaches were due to outsiders, but 37% were due to insider threats. These numbers show…

Read More
best cyber defense team

Research Shows that the Best Cyber Defense Teams are Antisocial

October 29, 2018

A new study that involved Army research to find the best cyber security defense team members showed that the best people for the job are antisocial, reconfirming what many people…

Read More
Email fraud prevention solution.

Phishing and Email Fraud are Top Security Risks for Corporations

October 25, 2018

Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With…

Read More
healthcare cyber security

Healthcare Organizations are Among the Biggest Targets for Attackers

October 22, 2018

Of all the organizations threatened by insider threats, healthcare companies top the list. In the past several years, healthcare organization data is among the top of the list in the…

Read More
software container malware

Developers Learn that Downloading Docker Hubs is Not Always Safe

October 18, 2018

Docker is the latest in popular technology where developers can quickly configure and deploy containers in an environment without affecting other components of an application. It’s a way to turn…

Read More
Data loss prevention.

Corporations Lose Data in Ways They Didn’t Imagine

October 9, 2018

Insider threats make up a large portion of cyber security risk. It’s a third of the risk when you manage sensitive data on your network. Most organizations think of cyber…

Read More
Malicious browser.

Malicious Browser Extensions Contribute to Insider Threats

October 7, 2018

Network administrators have a unique challenge providing users with an efficient working environment that also protects against network threats. Most administrators block random installations. But this can be a problem…

Read More
insider threat detection

How to Identify the Basic Signs of Insider Threats to your Local Network

September 22, 2018

Insider threats are cyber security breaches that stem from a trusted employee or vendor allowing an outsider to gain access to the local network. It’s a frustrating and difficult cyber…

Read More