Wednesday, May 14, 2008

Five Ways Insiders Go Bad

This is a nice summary of common ways insiders abuse their own networks to gain malicious access.

The insider threat has been discussed lately. I wrote an article for SearchSecurity a year ago about the subject, citing studies done by CERT, the leader in profiling malicious insiders.

0 Comments:

Post a Comment

Links to this post:

Create a Link

<< Home