insider threat

March 9, 2018

SECURITY

Using machine learning to detect possible insider threats

Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the cloud.

August 2, 2016

GOVERNMENT

Cybersecurity for Defense: Insider Threat Part 1

The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start with, the National Counterintelligence and Security Center defines an inside threat as occurring […]

May 2, 2014

SECURITY

Sensitive Data Exfiltration and the Insider

The Insider Lifecycle Traditional security is designed to keep outsiders from getting in. What happens when the enemy is an insider? A new paradigm must be explored, where the focus needs to shift inward and how data is going outbound. Identifying anomalies in data exfiltration is critical to how to spot the insider. The insider […]