Making Insiders Foot Soldiers In Enterprise Security
Employees and partners can either be part of the security problem or part of the solution. Here's a look at both
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
[Excerpted from "Making Insiders Foot Soldiers In Enterprise Security," a new retrospective of Dark Reading coverage posted this week on Dark Reading's Insider Threat Tech Center.]
Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage -- especially when it comes to intellectual property theft. This week, Dark Reading posts a compendium of some of its best recent coverage of the insider threat problem, including:
* Five Significant Insider Attacks Of 2012
* Endpoints Pose Increasing Threats To Enterprises, Studies Say
* Four Ways To Turn Insiders Into Assets
* Preventing Infrastructure From Becoming An Insider Attack
* Verizon: Most Intellectual Property Theft Involves Company Insiders
* Writing And Enforcing An Effective Employee Security Policy
To read all of these stories and more, download the free report on the Insider Threat Tech Cneter.
Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024