The most likely person to steal IP is not an external threat, but rather the person who developed it and uses it every day, according to Forcepoint Chief Scientist Dr. Richard Ford. And this insider threat actually may be more difficult to detect because typical event-based security analytics may not always be adequately equipped to stop it, he explained in an interview with SC Media at the 2019 RSA conference in San Francisco.If you use analytics, it's easy to spot, say, when you're accessing my data. But it's really hard to notice that when I access my data, my intent isn't to use it, it's to steal it," said Ford, who expounded on this topic in his very own RSA presentation this week. "Analytics around events is not good enough. What you have to do is change your unit of analysis and really understand the human."Forcepoint this week also announced the launch of X-Labs, which it's calling the "first dedicated research division to combine deep security expertise with behavioral science research. The team will be made up of security researchers, data scientists, psychologists and counter-intelligence specialists.
https://youtu.be/_Fg4OeQbQUQ
Forcepoint Chief Scientist Dr. Richard Ford with SC Media's Senior Reporter Bradley Barth at RSA 2019.
As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.
First VPN marketed itself on Russian-speaking cybercrime forums as a reliable tool for anonymity, offering features like anonymous payments and concealed infrastructure to help users evade law enforcement.
Cybercriminals are reportedly instructing victims to withdraw cash and deposit it into crypto kiosks, which then transfer the funds to attacker-controlled wallets.
Storm-2949 initiates attacks by targeting users with privileged roles, such as IT personnel or senior leadership, using social engineering tactics to obtain their Microsoft Entra ID credentials.