• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home Featured

Mitigating Insider Risk With Data Detection And Response

By Christos Flessas

Contributor by Contributor
June 13, 2023
in Featured, Security
Share on FacebookShare on Twitter

Last year’s reports showed that insider threats are increasing in frequency and volume and require a significant amount of time, effort, and expense to contain on average. In the following years, these threats will further increase due to the consolidation of a shift to more distributed working models – a world heritage from the pandemic era – BYOD policies and exponential growth of cloud-related technologies.

Today, the working area is highly dispersed and scattered. Personnel and devices are lying heavily distributed in many physical and digital places. Within such an elastic, kinetic, and rapidly transformed environment, neither our data remains at rest. It moves from and to the cloud at an unprecedented rate and speed. The above facts and negligent and malicious insider acts make unusual changes and anomalies challenging to monitor and detect. Nowadays, the need for advanced technology and data detection and response (DDR) tools to detect data movement on the fly and respond to incidents asap is more than necessary. It is imperative if we want our businesses to maintain their posture and cybersecurity hygiene.

The impact of insider threats

No matter the insiders’ motivation or security unawareness level, an incident caused by trusted humans is disruptive and significantly impacts any business. Negligent workers, disappointed and disgruntled staff, or vendors with bad intentions can put their organization at risk from the comfort of their homes, using legacy, obsolete, and not updated devices in many cases.

These insider incidents, apart from the common root cause, human nature, do have a common target: the data. Data breaches that lead to financial losses, compromise of sensitive data, and theft of intellectual property result in severe consequences for the revenue and reputation of the affected industry. The magnitude of the underlying insider risk is presented by the Bravura Security report, which highlights that bad actors have approached 65% of employees to assist in ransomware cyberattacks.

In the cloud era, where we all experience extremely high-speed data transfer rates, data breach incidents become more frequent, violent, and full-scale. As insider operations are concealed by typical workplace behaviour, security personnel are not alerted to a threat or “abnormal spike” by these activities. The result is that malicious or irresponsible insiders need only a fraction of the time to compromise a whole database of critical data and information.

Data security in the cloud and consolidated hybrid work world has to be a top priority. Every cybersecurity professional must monitor users’ activities using modern advanced tools, employ behaviour analytics to track behavioural anomalies, and use data detection and response (DDR) tools that can be integrated into existing SIEM solutions as a mitigation approach to potential insider threats, as soon as, and wherever they occur.

DDR in a nutshell

Data detection and response (DDR) is an emerging approach, often referred to as the new cloud data loss prevention (DLP) solution. It introduces dynamic monitoring to cloud environments and can monitor cloud data in real-time and secure them from exfiltration. It uses known threat models and attack patterns revealed in previous attacks, as well as AI and machine learning from historical data algorithms, to predict and prevent insider risks.

A wide range of incident types falls into DDR’s detection range:

  • Snapshots and shadow backups that take place outside of approved procedures,
  • Moving data to insecure storage
  • Moving data to geographical locations that are not compliant with the law.

DDR is dynamic. It sits on top of the static and posture-focused defense layer provided by Data Security Posture Management (DSPM) and Cloud Security Posture Management (CSPM) tools. It keeps an eye on cloud environments where data is stored and employs real-time log analytics to spot data risks as soon as they arise.

To do so, DDR – opposed to other systems that focus on configurations and data at rest – focuses on real-time data events that trigger alarms and allow security personnel to take reactive actions before the incident occurs or at its birth stage.

How DDR works – pros and cons

Nowadays, data is stored across a wide cloud area; PaaS, DBaaS, and IaaS are places where one can find data of a mid-sized company. At first, DDR uses DSPM capabilities to create the foundation for finding and categorizing data assets. Detected risks, such as unencrypted sensitive data, are flagged and prioritized before being remediated by IT professionals or data owners.

When all data assets are mapped, DDR monitors their activity via cloud-native event logging. DDR parses the log and applies a threat model to identify anything suspicious. If an anomaly is detected, DDR immediately issues an alert and suggests security professionals with the best response to that.

The benefits of data detection and response in mitigating insider risk are numerous:

  • Early warning helps businesses prevent insider risk from escalating.
  • Identify and analyze the insider threats’ root cause, to address them proactively and efficiently.
  • Comply with standards and regulatory requirements.
  • Enables dynamic data security in highly distributed hybrid and multi-cloud environments.
  • Protect data across any exfiltration channel, such as removable drives, emails, and cloud applications.
  • The use of a single threat model across environments removes the need for ad-hoc solutions per data service.

However, there are challenges in implementing DDR. These are:

  • Significant investment in technology, sophisticated tools, and the need for cybersecurity experts.
  • A high volume of alerts can generate alert fatigue. Alert prioritization to reduce alerts’ false alarm rate is imperative.
  • DDR can raise ethical concerns as it dives deep within user data. Organizations must comply with legal and ethical standards and respect employees’ privacy rights.

Protect data with a solid DDR solution

Businesses shall realize how insiders may threaten their sensitive data and follow best practices to maximize the benefits of data detection and response solutions. They should adopt a risk-based data detection and response approach, focusing on the highest insider risk areas and the most critical assets and data. Organizations should also establish precise data detection and response procedures, including ethical policies, to eliminate the chance of becoming a “big brother” for their insiders.

Lack of knowledge and experts’ shortage shall not be an obstacle or an excuse. There are numerous cybersecurity experts with whom businesses can work closely to implement a proper DDR solution to protect their data and assets and mitigate insider threat risk.

 

 

About the Author: Christos Flessas is a Communications and Information Systems Engineer with more than 30 years of experience as an Officer of the Hellenic Air Force (HAF). He is an accredited NATO tactical evaluator in the Communication and Information Systems (CIS) area and the National Representative (NatRep) at Signal Intelligence CIS and at Navigation Warfare (NavWar) Wrking Groups. Christos holds an MSc in Guided Weapon Systems from Cranfield University, UK. He has also attended numerous online courses such as the Palo Alto Networks Academy Cybersecurity Foundation course. His experience covers a wide range of assignments including radar maintenance engineer, software developer for airborne radars, IT systems manager and Project Manager implementing major armament contracts. 

Christos is intrigued by new challenges, open minded, and excited for exploring the impact of cybersecurity on industrial, critical infrastructure, telecommunications, financial, aviation, and maritime sectors. 

Related Posts:

  • REv-CC-FutureProofIT-AdressingInsiderThreats-02@2x
    The Silent Enemy: How Insider Threats Are Stealing…
  • Cloud-Security-Breaches-webinar-hero-image
    The Role Of IP Addresses In Cloud Security
  • choosing_the_right_dlp_fca4dd5b27
    Why Data Loss Prevention Is necessary
  • What Q4 2022 Tech Earnings Tell Us About 2023
  • Nigeria's POS Transactions Hit A Monthly All-time High Of N735.6 Billion In September 2022
    Nigeria's POS Transactions Hit A Monthly All-time…
  • Here's A Breakdown Of Amazon's Mixed Q1 2023 Earnings Report
  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • How High Cost Of Internet Is Impeding The Growth of Africa’s Digital Economy
    How High Cost Of Internet Is Impeding The Growth of…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: data detectionData detection and responsedata securityddr
Contributor

Contributor

Posts by contributors. You can send in a post to be reviewed and published to info@techbooky.com

BROWSE BY CATEGORIES

Select Category

    Receive top tech news directly in your inbox

    subscription from
    Loading

    Freshly Squeezed

    • Threads Adds Enhanced Audience Insights July 22, 2025
    • Telegram Launches Cryptocurrency Wallets For U.S. Users July 22, 2025
    • Chinese Hackers Exploiting SharePoint Zero-day – Microsoft July 22, 2025
    • UK Government Signs OpenAI Deal for Public Service AI July 22, 2025
    • ChatGPT Users Send 2.5 billion Prompts Daily July 22, 2025
    • Kuda Unveils New Wallet For Multiple Currencies July 22, 2025

    Browse Archives

    July 2025
    MTWTFSS
     123456
    78910111213
    14151617181920
    21222324252627
    28293031 
    « Jun    

    Quick Links

    • About TechBooky
    • Advertise Here
    • Contact us
    • Submit Article
    • Privacy Policy
    Generic selectors
    Exact matches only
    Search in title
    Search in content
    Post Type Selectors
    • African
    • Artificial Intelligence
    • Gadgets
    • Metaverse
    • Tips
    • About TechBooky
    • Advertise Here
    • Submit Article
    • Contact us

    © 2025 Designed By TechBooky Elite

    Discover more from TechBooky

    Subscribe now to keep reading and get access to the full archive.

    Continue reading

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.