What is the insiders threat situation?
The technology is absolutely essential in the day to day professional, and yet it has advanced and evolved in the defense against the external threats, the internal scope has been left unattended.
The current business environment is marked by digitization, and has in the area of cybersecurity growing and diverse internal risks that demand, to avoid them, support in prevention and, in a novel way, in prediction.
- Current reactive actions
- Damage produced
- Lack of awareness
- The Need for Disruptive Technology
The companies vision
Source: Insider Threat Spotlight Report 2016
What do Organizations do?
Today efforts are focused on working on the early detection of potential harmful activities.
In almost all cases, the response of the companies is subsequent to the incident and in any case is limited to reactive actions of minimization of damages.
- Use external defense tools
- Invest in reactive detection
- Acquiring DLPs (Reactive)
- Assume there are gaps
- Not having preventive measures
- Not having predictive measures
- Internal Threat Model Misstatements (Security Policy)
What does Kymatio offer?
Kymatio is based on paradigms of Big / Smart Data and Machine Learning strongly powered by a powerful psychological-based approach to the identification of departments and personnel where the internal risk deactivation protocols have to be applied.
It is necessary that companies adopt a proactive attitude in the prevention of internal risks. Employee collaboration is key to success and can only be achieved if people are offered a clear benefit.
- Psychological Disruptive Approach
- Automatic Learning (Machine Learning)
- Data-based (Big & Smart Data)
- Advanced Control Reports and Charts
- Customizable Window Risk Scoring
- Employees: the human firewall (Human Firewalls)
- Human-centric operations
The ten best Spanish cybersecurity start-ups will present their projects at the ‘Demo Day’ in Madrid
The ten best Spanish cybersecurity start-ups will present their projects at the ‘Demo Day’ in Madrid Published on 02/16/2018 They are the finalists of the International Acceleration Program ‘Cybersecurity Ventures’, organized by the National Institute of Cybersecurity (INCIBE) The ten finalist projects of the International Cybersecurity Start-up Accelerator program, Cybersecurity Ventures, will meet on 21 […]
On Wednesday 9th february 2018, an anonymous person published the proprietary source code of a core and fundamental component of the iPhone’s operating system. A user named “ZioShiba” posted the closed source code for iBoot—the part of iOS responsible for ensuring a trusted boot of the operating system—to GitHub, the internet’s largest repository of open […]
The magazine Emprendedores echoes the companies selected by the INCIBE accelerator and which are part of the third edition of Cybersecurity Ventures. All of them represent “the national spearhead” in the matter, according to Félix Barrio, manager of Talent, Industry and support for R + D + i at INCIBE. Kymatio: when the threat is […]