Similar Articles |
|
National Defense July 2014 Stew Magnuson |
Funding Not Following Concerns About Insider Threats Spies, disgruntled workers and intellectual property thieves have always been a problem in both government and private sector organizations. |
National Defense February 2015 Sarah Sicard |
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. |
National Defense January 2014 Stew Magnuson |
Rooting Out Insider Threats Among DHS' Top Priorities, Execs Say The Department of Homeland Security's information technology needs in 2014 will be driven by trends such as big data analytics, the ubiquity of mobile devices and a new emphasis on finding insider threats. |
Inc. April 2009 Kasey Wehrum |
Technology: When IT Workers Attack How to prevent tech sabotage. |
U.S. Banker December 2009 Glen Fest |
It's a Jungle in There Financially distressed workers are becoming a prime fraud worry for banks. But is it enough to prompt more investment in prevention? |
Insurance & Technology January 5, 2007 Larry Greenemeier |
The Threat From Within Insiders represent one of the biggest security risks because of their knowledge and access. To head them off, consider the psychology and technology behind attacks. |
CFO August 1, 2002 Scott Leibs |
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. |
CIO June 1, 2002 Sarah D. Scalet |
Dr. Crime's Terminal of Doom Most computer attacks come from the outside. But the costliest ones come from the inside. Here's how to manage the risk without making honest employees feel like crooks |
U.S. Banker September 2004 Karen Krebsbach |
Security: The Inside Job Your employees wouldn't rip you off, right? Think again. Their theft will cost banks $2.4 billion this year. |
HBS Working Knowledge May 30, 2005 Deepak Malhotra |
Six Steps for Making Your Threat Credible Sometimes the best way to make your threat credible is to act in a way that would normally be considered irrational. Restricting your options, sinking money into a potentially useless enterprise, and surrendering authority are the types of behaviors that smart negotiators usually try to avoid. |
Information Today July 16, 2013 Nancy K. Herther |
PRISM and the First Amendment: A Critical Issue Once Edward Snowden lands in some friendly country or decides to return to the U.S., we can hope that attention is again focused on PRISM and surveillance. So far, the responses from government officials have been less than stellar. |
Salon.com April 26, 2001 Fiona Morgan |
Does the U.S. spy too much? In the wake of the spy plane flap with China, experts propose international rules of order that would limit excessive espionage... |
The Motley Fool July 16, 2004 Tom Gardner |
Martha Stewart, Was It Insider Trading? She was convicted of perjury, but did she make an illegal stock trade? Investment Intelligence from Insider Trading author weighs in. |
BusinessWeek June 28, 2004 Paul Magnusson |
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. |
D-Lib Sep/Oct 2012 Vermaaten et al. |
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. |
Wall Street & Technology August 20, 2007 Melanie Rodier |
Traditional Investigation Methods and New Tech Help Catch Insider Traders As insider trading rises globally, regulators and banks are using complex event processing and remote-control software to catch rogue traders. |