IT security
Follow
Find
3.8K views | +0 today
 
Scooped by Pauline Marguet
onto IT security
Scoop.it!

Cyber Attacks Explained: Network Sniffing

Cyber Attacks Explained: Network Sniffing | IT security | Scoop.it
Let's focus on a wider hacking approach called network sniffing, something commonly used by prying hackers. We will look at a few tools typically used as sniffers and also figure out how to protect IT infrastructure from such ...
more...
No comment yet.
IT security
Everything you have always wanted to know about IT security but were afraid to ask !
Your new post is loading...
Your new post is loading...
Scooped by Pauline Marguet
Scoop.it!

5 ways to tackle the insider threat of human error

How to protect against social engineering hackers.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

How to Create Awareness of the Insider Threat

How to Create Awareness of the Insider Threat | IT security | Scoop.it
One of the legacies of Edward Snowden's treason is that companies are now concerned about the insider threat more than they ever were before. He demonstrates that a single person inside an organization can devastate the organization.
more...
Jens Hoffmann's curator insight, April 27, 5:07 PM

So much, for "We trust our people and we don't need a 4-eyes principle control".

Scooped by Pauline Marguet
Scoop.it!

Wallix AdminBastion étend sa compatibilité aux principaux hyperviseurs du marché

Wallix AdminBastion étend sa compatibilité aux principaux hyperviseurs du marché | IT security | Scoop.it
Des solutions innovantes pour le contrôle et la traçabilité des utilisateurs à privilèges en entreprise
Pauline Marguet's insight:

L’éditeur couvre notamment désormais Microsoft Hyper-V, KVM et VMWare.

more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Jurisprudence – Sans preuve , pas d’indemnisation en cas de perte de données

Jurisprudence – Sans preuve , pas d’indemnisation en cas de  perte de données | IT security | Scoop.it

La société Haulotte avait signé un contrat d’infogérance (externalisation totale de son système informatique) avec la société Euriware, pour une durée de 5 ans, renouvelable annuellement par tacite reconduction. Suite à un incident sur l’un des sites de la société Haulotte et à l’intervention

technique du prestataire Euriware, la société Haulotte a constaté la disparition de très nombreux fichiers.


Cette dernière a alors résilié le contrat avec son prestataire pour faute grave. La réversibilité du système n’ayant pas totalement abouti et à défaut d’accord amiable entre les parties, la société Haulotte a assigné le prestataire en référé-expertise et réclamait une condamnation provisionnelle de son adversaire à hauteur de 400.000€, à valoir sur les dommages intérêts en réparation du préjudice subi.

 

La juridiction de première instance a fait droit aux demandes de l’entreprise Haulotte et lui a accordé une provision de 300.000€. La société Euriware a interjeté appel de la décision et a obtenu gain de

cause. Dans un arrêt du 11 février 2014, la Cour d’appel de Lyon relève que la société Haulotte sollicite le versement de la provision parce qu’elle estime avoir beaucoup investi dans la recherche des causes du sinistre et dans l’identification des fichiers considérés comme perdus.


Selon la Cour, ces dépenses ne seront susceptibles d’être prises en compte au titre d’un préjudice indemnisable que le jour où la société Haulotte aura démontré la faute de la société Euriware dans la disparition effective de fichiers et lorsqu’il sera avéré que ces disparitions ont affecté financièrement la bonne marche de cette entreprise. Or, à ce stade de la procédure, la société Haulotte n'a pas démontré la réalité de son préjudice financier, se contentant d’énumérer les fichiers qu’elle prétend avoir perdus

sans expliquer en quoi ces pertes ont affecté sa production industrielle ou la qualité de ses relations avec ses clients.


Aussi, en l’absence de toute démonstration, la Cour ne peut exclure que les fichiers litigieux n’aient en réalité aucune valeur marchande, rendant ainsi sans objet l'indemnisation.

 

En conséquence, la Cour d'appel a réformé la décision de première instance et débouté la société Haulotte de sa demande de condamnation provisionnelle.

more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Cloud, Big Data Raises Spectre of Insider Data Theft: Ovum - Computerworld India

Cloud, Big Data Raises Spectre of Insider Data Theft: Ovum - Computerworld India | IT security | Scoop.it
Cloud, Big Data Raises Spectre of Insider Data Theft: Ovum
Computerworld India
Ovum says poor "privileged user" controls are in place at UK organisations, and that almost half of organisations admit that insider threats are harder to detect.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

4 types of employees who put your cybersecurity at risk

4 types of employees who put your cybersecurity at risk | IT security | Scoop.it
4 types of employees who put your cybersecurity at risk, and 10 things you can ...
ABA Journal
The insider threat to workplace security is a serious–and growing–problem, Jelderks and Ries said.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Morrisons data theft - police arrest Leeds employee

Morrisons data theft - police arrest Leeds employee | IT security | Scoop.it
POLICE investigating the theft of the bank account details of thousands of Morrisons’ staff have arrested one of the company’s employees in Leeds.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Insider threats to medical data worry hospitals

Insider threats to medical data worry hospitals | IT security | Scoop.it
Insider threats to medical data worry hospitals DOTmed.com According to the survey, the greatest perceived "threat motivator" is that of health care workers potentially snooping into the electronic health information of friends, neighbors, spouses...
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Il est temps de reconsidérer l'ère de la sécurité périmétrique...

Il est temps de reconsidérer l'ère de la sécurité périmétrique... | IT security | Scoop.it
In an age of advanced attacks and insider threats, traditional perimeter-based security just doesn't cut it, argue two leading InfoSec experts.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Les menaces internes provoquées en majorité par des soucis de compréhension des utilisateurs

Les menaces internes provoquées en majorité par des soucis de compréhension des utilisateurs | IT security | Scoop.it
"Privileged user management is central to enforcing security policies" says Bob Tarzey, analyst at Quocirca.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

When It Comes to the Insider Threat, Hope Is Not a Strategy

When It Comes to the Insider Threat, Hope Is Not a Strategy | IT security | Scoop.it
The insider threat is very much a reality, and because it hides in the details, it’s one of the biggest threats businesses can encounter.
Pauline Marguet's insight:

L'espoir ne suffit pas... 

more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Insider Threat Programs: 5 Easy Steps to Protect Your Company ...

Insider Threat Programs: 5 Easy Steps to Protect Your Company ... | IT security | Scoop.it
The insider threat is a real concern across government and industry and unfortunately, we continue to see significant evidence of the damage incurred by malicious insiders, such as Snowden and Manning.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

IT security predictions : 2014 will see an increased focus on Privileged Users...

IT security predictions : 2014 will see an increased focus on Privileged Users... | IT security | Scoop.it
IT security predictions for 2014
CSO Magazine (blog)
This is not a new concept nor concern, but the Snowden incident puts privileged users back in the spotlight in 2014. 5. ...
Pauline Marguet's insight:

Edward Snowden gained access to the infamous NSA documents through his administrative rights to systems in addition to accounts he possibly garnered through social engineering of colleagues. Those with privileged access can potentially do a lot of damage. This is not a new concept nor concern, but the Snowden incident puts privileged users back in the spotlight in 2014.

more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Insider threat brought about by human error... How to prevent it?

Insider threat brought about by human error... How to prevent it? | IT security | Scoop.it
Help Net Security 63% of orgs believe they can't stop data theft Help Net Security Websense released the first report of the Ponemon Institute survey, “Exposing the Cybersecurity Cracks: A Global Perspective,” which gives new insight into why...
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

In the UK, 36% of IT professionals believe employees would access or steal confidential information, yet 38% do not have, or know of, any systems to stop employees accessing unauthorised data

In the UK, 36% of IT professionals believe employees would access or steal confidential information, yet 38% do not have, or know of, any systems to stop employees accessing unauthorised data | IT security | Scoop.it
SC Magazine UK UK businesses all talk and no action when it comes to insider threats – research Information Age While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish...
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Insider Threat – Concern Subject for Organization

In current time, cyber crime has dispersed threat widely, and compelled every individual to think about emerging cyber crime.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

A solution to trace Privileged Accounts is not nice to have, it's a necessity

A solution to trace Privileged Accounts is not nice to have, it's a necessity | IT security | Scoop.it
The unusual suspects: 3 ways to deal with insider threats
Defense Systems
For DOD IT teams, the reality of an insider threat may be far more mundane, though no less critical.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

WAB as a Service (WAAS) : WALLIX propose son AdminBastion en mode MSSP

WAB as a Service (WAAS) : WALLIX propose son AdminBastion en mode MSSP | IT security | Scoop.it
Des solutions innovantes pour le contrôle et la traçabilité des utilisateurs à privilèges en entreprise
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Trust users to improve security, say analysts

Trust users to improve security, say analysts | IT security | Scoop.it
Despite the dangers of insider threats, Gartner analysts Tom Scholtz and Ant Allan believe that trusting people can go a long way to improving business security.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Manage system administrators with Privileged User Management solutions

Manage system administrators with Privileged User Management solutions | IT security | Scoop.it
How to manage your network administration with privileged user management, a system that allows only those they have to access sensitive information
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

RSA 2014: Insider threat detection tools critical to detection success

Effective insider threat detection tools are critical to a successful enterprise insider threat program, according to a speaker at RSA Conference 2014.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

The free trial version of Wallix AdminBastion 4.0 is now available

The free trial version of Wallix AdminBastion 4.0 is now available | IT security | Scoop.it
Des solutions innovantes pour le contrôle et la traçabilité des utilisateurs à privilèges en entreprise
Pauline Marguet's insight:

Try it on our website...

more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Plus de 2560 failles de sécurité interne chaque jour dans les entreprises américaines...

Plus de 2560 failles de sécurité interne chaque jour dans les entreprises américaines... | IT security | Scoop.it
Help Net Security
Over 2560 Internal Security Breaches Occur in US Businesses Every Day
PR Web (press release)
IS Decisions Insider Threat Manifesto.
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Un nouveau cas d'Insider Threat chez IBM

Un nouveau cas d'Insider Threat chez IBM | IT security | Scoop.it
IBM’s name was thrown in the fire because of the actions of an ex employee with an axe to grind who took confidential information and anonymously leaked it (Insider Threat Highlighted by IBM Financial Info Leak - #security, #breach, #compliance
more...
No comment yet.
Scooped by Pauline Marguet
Scoop.it!

Senior Managers = biggest insider threats ?

Senior Managers = biggest insider threats ? | IT security | Scoop.it
New survey exposes poor practices and gaffes by managers who expose company data (RT @NetIQ: Sr.
more...
No comment yet.