• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » cyber security » Forcepoint’s Novel Approach to Insider Attacks

Forcepoint’s Novel Approach to Insider Attacks

2018-04-30 by Max

Cyber attacks are on the rise, and they come in new and varied forms that are meant to defeat current defense strategies and mechanisms. This is the nature of warfare, regardless of the battlefield, and cyber security needs to evolve to stay relevant. There are worries that continued AI research will lead to increasingly dangerous and effective cyber attacks, this would require any company to invest in an AI of their own to defend themselves. In the case of AI assisted cyber warfare, processing power would be a major factor and the side that can throw more computations than the other will most likely win. Even without the threat of AI driven cyber warfare, the cyber security landscape can’t remain static if it there is to be an effective defense against cyber attacks. Just as attackers are constantly tinkering and experimenting with new modes of attack,so to must the defenders alter and change their defenses. Cyber attacks work by targeting weak-points in defenses, and these weak-points are probed out hours, days, weeks, months or even years in advance. These probes go unnoticed, or the weaknesses they find go unpatched. In some cases attackers use social engineering attacks to penetrate secure networks, and these attacks are some of the oldest tricks in the books. Calling and asking for passwords or login information has accounted for hundreds of successful network penetrations over the years.

Forcepoint is a company aimed at changing the face of the cyber security landscape by focusing on a factor that’s often overlooked in modern cyber security: the user. Cyber attacks can often be linked to insiders or people who were recently part of the organization. While the rise of malicious cyber attacks from outside, unrelated sources is on the rise there are still plenty of threats from inside a company. Forcepoint seeks to reduce or eliminate these risks by using an algorithm they’ve developed that watches for suspicious behavior in employees. It does so by building baseline profile for each employee it monitors. Forcepoisnt;s software watches who the employee is talking to and for how long they talk; it also logs what websites employees visit and what they do on those websites. Forcepoint’s software is looking for patterns and observable variables that it can use to determine when an employee is going rogue. Flags like visiting new websites, talking to new people, and accessing files they normally wouldn’t would notify the relevant people about the possible threat. These software constantly updates the profile it has on employees, so a new hobby isn’t going to set the IT department on a hapless employee’s trail. Forcepoint hopes to help companies deal with the attacks and leaks that can arise when a high-up employee or member of the IT department is let go.

Filed Under: cyber security, News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version