Best Practices For Creating An Insider Threat Program
SearchSecurity, April 28th, 2022
May 8, 2022,
Volume 290, Issue 1

A thorough insider threat program includes plan preparation, threat assessment, and plan review and renewal. Learn how to implement this three-step model to protect your company.

"Insider threats continue to be a potent attack vector across every industry vertical," warns Ashwin Krishnan in SearchSecurity.

"Insider attacks -- whether malicious or negligent -- can lead to system outages, data theft, ransomware and advanced persistent threats.

A challenging aspect of insider threats is that they can be even more difficult to detect than external threats. Insiders can capitalize on their unique insights into their organization's systems and launch attacks that are undetectable or appear to fall within acceptable behavioral norms..."

Read More ...


    Other articles in the IT News - Security section of Volume 290, Issue 1:

    See all archived articles in the IT News - Security section.