Monthly Archives: August 2014

A Guide To Insider Threats

Insider attacks are particularly difficult to defend against. Insiders have internal knowledge of the network, and often know a system’s vulnerabilities. Even if they don’t violate security policies, they can perform authorized actions in a malicious way.

I like Common Sense Guide to Mitigating Insider Threats. It’s light reading, if you like that sort of thing. Here are the recommendations in brief:

  1. Consider threats from insiders and business partners in enterprise-wide risk assessments. …