Tech Center Insider Threat
Dark Reading's Insider Threat Tech Center is a unique Web destination that offers breaking news, opinion, and exclusive reports on all aspects of internal security threats, and the technologies and practices used to prevent them.
A real-life data breach incident underscores the importance.
Experts piece together clues to paint possible scenarios for how the NSA contractor accessed, downloaded, and leaked secret agency documents on its spying operations
Apple, General Motors, Home Depot, Johnson & Johnson, Chevron, Boeing, and other major corporations easily fall to social engineers in recent contest, new report shows
Enterprise constantly fail in four areas, which, in turn, can easily cause intentional and unintentional data leaks
The NSA leaks by a systems administrator have forced enterprises to rethink their risks of an insider leak and their privileged users' access
Popular contest and presentation show real risks associated with social engineering
- Tech Insight: Protecting Against Risks Posed By Anonymization Tools
- Report: Phone Fraud Plagues Call Centers At Financial Institutions
- Hacking The Human Side Of The Insider Threat
- NSA Leak Ushers In New Era Of The Insider Threat
- Study: Rogue Employees Are Top Concern For Security Pros
By The Numbers
When Trusted Business Partner Insiders Strike
When trusted business partners handle your sensitive information, their insiders are your insiders. According to a recent CERT survey, the majority of IP theft and IT sabotage insider incidents at business partner organizations are performed by technical employees while fraud is committed mostly by non-technical staff.
Source: Insider Threat From Trusted Business Partners, CERT, 2012
Around the Web
- IT Pros Admit To Plugging In Found USB Drives
- DSHS Contractor's Laptop Stolen In Gig Harbor; Identity Theft Possible Risk
- Spear Phishes Used To Infect South Korean Corporate Networks
- Straight Talk On Security Gets Employees To Listen -- And Comply
- Employees Still Use Online File Sharing, Even If Companies Prohibit Its Use