Identifying Potential Malicious Insiders

All insider threats are not created equal, however, all can do equal amounts of damage to a company or organization. I have written on this topic before in relation to the F.B.I.'s IDLE program, which was begun to help companies find malicious insiders. In this post, I want to focus more on the insiders themselves, … Continue reading Identifying Potential Malicious Insiders

Whac-A-Mole: Profiling and Stopping the Malicious Insider

Two-thirds of data breaches involve insiders giving information to outsiders, whether they are aware of what they are doing or not. According to a report by Kroll Advisory Solutions, “moles, opportunists, contractors, disgruntled employees, and ex-IT personnel—all currently pose a greater risk to corporate intellectual property than state-sponsored hacking and APTs, both in frequency and … Continue reading Whac-A-Mole: Profiling and Stopping the Malicious Insider