Download the Insider Threat Deep Dive Report

A wide range of detection and prevention countermeasures can vastly reduce the threat of malicious activity by insiders. Learn which work best and how to deploy them for maximum effect

By InfoWorld staff, InfoWorld |  Security, insider, insider threat

Insiders are responsible for as much as 80% of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.

In this Deep Dive special report, InfoWorld takes you through the three stages of dealing with insider threats:

Along the way, our expert covers the importance of event logs, data leak detection/prevention products, and honeypots, as well as new considerations stemming from the rise of cloud computing. Finally, you'll get a list of tools and techniques your business can adopt to stop insider threats before they begin.

To continue reading, register here to become an Insider


Originally published on InfoWorld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness