Five Ways Insiders Go Bad
This is a nice summary of common ways insiders abuse their own networks to gain malicious access.
The insider threat has been discussed lately. I wrote an article for SearchSecurity a year ago about the subject, citing studies done by CERT, the leader in profiling malicious insiders.
The insider threat has been discussed lately. I wrote an article for SearchSecurity a year ago about the subject, citing studies done by CERT, the leader in profiling malicious insiders.
0 Comments:
Post a Comment
<< Home