Select the directory option from the above "Directory" header!

Menu
Download the Insider Threat Deep Dive Report

Download the Insider Threat Deep Dive Report

A wide range of detection and prevention countermeasures can vastly reduce the threat of malicious activity by insiders. Learn which work best and how to deploy them for maximum effect

Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.

In this Deep Dive special report, InfoWorld takes you through the three stages of dealing with insider threats:

Along the way, our expert covers the importance of event logs, data leak detection/prevention products, and honeypots, as well as new considerations stemming from the rise of cloud computing. Finally, you'll get a list of tools and techniques your business can adopt to stop insider threats before they begin.

Download the "Insider Threat Deep Dive Report" for all this info and more. It's hard enough fighting outside hackers and scammers who want to penetrate your company's security -- make sure you aren't battling destructive forces within your business as well.

InfoWorld has an abundance of security resources for the tech professional. Dig into InfoWorld's trove of real-world enterprise security knowledge:

Stay up on the latest security developments in InfoWorld's Security channel.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Show Comments