Wednesday, May 14, 2008

Five Ways Insiders Go Bad

This is a nice summary of common ways insiders abuse their own networks to gain malicious access.

The insider threat has been discussed lately. I wrote an article for SearchSecurity a year ago about the subject, citing studies done by CERT, the leader in profiling malicious insiders.


Post a Comment

<< Home