ISTARI Spotlight 202 Insider Threat Report

10.2023 . Spotlight

2023 Insider Threat Report

Based on 326 cybersecurity professionals, this survey uncovers the trends around insider threats and how organisations respond. It found heightened concern over the insider threat risk.


Article 2  McKinsey

10.2023 . Spotlight

McKinsey – Insider Threat: The Human Element of Cyberrisk

With 50% of cybersecurity breaches caused by insiders, many businesses are enacting blanket policies that monitor all of their employees to help tackle this risk.

ISTARI Spotlight Carnegie Mellon

10.2023 . Spotlight

Common Sense Guide to Mitigating Insider Threats

This comprehensive report from Carnegie Mellon University (2022) analyses 3,000 cases of insider threat to provide 22 evidence-based best practices for organisations.

ISTARI Spotlight WormGPT

09.2023 . Spotlight

WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

Generative AI is being manipulated to aid cybercriminals in business email compromise attacks, with its ability to instantly generate personalised text being seized upon to write convincing phishing emails that won’t get flagged as spam.


ISTARI Spotlight ChatGPT incident response plans

09.2023 . Spotlight

ChatGPT can write ransomware, but what about incident response plans?

Cyberattacks have increased by 7% in the first quarter of this year, and it’s possible that cybercriminals’ ability to exploit ChatGPT has contributed to this rise.

ISTARI Spotlight Team8 report

09.2023 . Spotlight

Generative AI and ChatGPT Enterprise Risks

Executives, including CISOs, are finding themselves in a tricky position: Employees and business units are swiftly embracing generative AI technologies, but existing policies and processes do not yet reflect the power and perils of generative…

Understanding the New SEC Cybersecurity Rules ISTARI

08.2023 . Spotlight

Understanding the New SEC Cybersecurity Rules: A Guide for Executives

The new SEC rules introduce a four-day reporting period for material cyber incidents, emphasise the board’s role in managing cyber risks, and require periodic disclosure of risk management processes.


Get our monthly newsletter, Spotlight, delivered to your inbox.