The role endpoint monitoring plays in detecting and prosecuting insider threats. What can your networks’ endpoints tell you about potential insider threats? – iCrowdNewswire
Spain Brazil Russia France Germany China Korea Japan

Artificial Intelligence driven Marketing Communications

Apr 15, 2019 11:44 AM ET

The role endpoint monitoring plays in detecting and prosecuting insider threats. What can your networks’ endpoints tell you about potential insider threats?


iCrowd Newswire - Apr 15, 2019
null

Image Credit: Shutterstock
 

Two recent high-profile security incidents have made headlines across the United States and APAC regions. One was the arrest of United States Coast Guard Lt. Christopher Hasson. The other was the arrest of Yi Zheng, a Chinese national working as a contractor for Australian financial services firm AMP. Hasson was charged with several crimes and accused of being a white supremist in the middle of planning a terror plot. Zheng was arrested and pleaded guilty to attempting to steal and sell confidential AMP customer data on the dark web. 

Security and risk professionals should be extremely interested in these arrests. They show that when organizations have visibility over endpoint behavioral data and the ability to collect and analyze it, that malicious insider threats can be detected long before they have a chance to inflict significant damage.  

Evidence and behaviors

There was a litany of evidence gathered and behaviors observed on the two men’s endpoints that led prosecutors, AMP and the USCG to conclude that both suspects had drifted across legal boundaries.   

In the case of Hasson, prosecutors presented proof showing that he had extremist views, fantasized about mass murder, was possibly targeting prominent government and media personalities for a terror strike, and making illegal drug purchases. 

Contact Information:

David Wilcox








Tags:    Artificial Intelligence Newswire, Wire, United States, English