Cyber attacks are no longer the work of bored teens; too often the bad guys have a seat inside the organization – and access to valuable and sensitive data. An insider threat might not be a present employee or stakeholder; it could be former one, a third party worker or someone who at one time had access to proprietary or confidential information. And these threats are trick to detect, especially since trusted co-workers can be hesitant to report concerns. What’s the solution?
Wednesday, June 12
The enemy within: Addressing insider risks