Menu

NSA Employee Brings the Insider Threat to U.S. Security Concerns

intelligentID | June 9, 2017

Last week, the U.S. government suffered the form of security breach that cybersecurity specialists the world over have long predicted – that a malicious employee with top-level security clearance can prove themselves to be the most dangerous of all enemies to security and cyber integrity – the Insider Threat. The FBI soon arrested Reality Leigh […]

Lexmark and Intelligent ID announce end-to-end solution that provides insider security threat protection

intelligentID | May 31, 2017

Lexington, Ky., May 31, 2017   Lexmark International, Inc., a global imaging solutions leader, today announced an end-to-end solution that provides insider security threat protection for printing devices. Print security is a critical component of infrastructure optimization that can significantly reduce security gaps between documents, devices, the network and all points in between. Today’s announcement […]

Ransomware and the Insider Threat

intelligentID | May 15, 2017

Last week, companies all over the world were rocked to the core when a malicious form of “ransomware” infected thousands of industries. In the wake of the “WannaCry” cyberattack, we at Intelligent ID have been asked by many of our long-standing clients about the nature and overall dangers of such insidious forms of ransom-seeking hacker […]

Data Loss Prevention 101, Part Three: How Can Endpoint Security Help Me?

intelligentID | April 28, 2017

This week, we are continuing our three-part briefing on the basic elements every company and organization should know regarding their own data loss prevention tactics. In our previous entry, we took a look at “root cause,” or true origin of a data security breach. This week, we examine the target itself – your network’s endpoint, […]

Data Loss Prevention 101, Part Two: What Is Root Cause?

intelligentID | April 26, 2017

This week, we are continuing our three-part briefing on the basic elements every company and organization should know regarding their own data loss prevention tactics. In our previous entry, we took a look at the many forms in which the “Insider Threat” can penetrate your most vital information, spread out across an entire network of […]

1 2 3 4

Categories

Additional Resources

Request a Demo
Allow our team to show your team the IID difference.