MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
November 2013
Stew Magnuson
Companies Ill-Prepared to Fend Off Insider Threats Two high-profile cases are putting a spotlight on insider threats in the private sector, particularly companies that do business with the Defense Department, intelligence agencies and other government organizations. mark for My Articles similar articles
National Defense
February 2015
Sarah Sicard
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. mark for My Articles similar articles
Bank Systems & Technology
September 27, 2004
Ivan Schneider
When Insiders Attack Financial institutions are full of insiders. That's why the Secret Service National Threat Assessment Center (NTAC) and the CERT Coordination Center (CERT/CC) of Carnegie Mellon University's Software Engineering Institute conducted a behavioral and technical study of insiders who committed crimes using information technology. mark for My Articles similar articles
InternetNews
September 23, 2004
Sean Michael Kerner
Report: CEOs Stagnant on Security Despite a rash of threats, CEOs are still taking a weak approach to combat IT security problems. mark for My Articles similar articles
Inc.
April 2009
Kasey Wehrum
Technology: When IT Workers Attack How to prevent tech sabotage. mark for My Articles similar articles
CFO
August 1, 2002
Scott Leibs
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. mark for My Articles similar articles
Bank Director
2nd Quarter 2009
Karen Epper Hoffman
Beware the Inside Job In this time of unprecedented layoffs, massive budget cuts, and related merger activity, banks need to be careful of the security threat that lies within their own organization. mark for My Articles similar articles
U.S. Banker
December 2009
Glen Fest
It's a Jungle in There Financially distressed workers are becoming a prime fraud worry for banks. But is it enough to prompt more investment in prevention? mark for My Articles similar articles
InternetNews
August 25, 2009
Measuring and Mitigating the Insider Threat A study finds that no enterprise is immune from the perils of negligence or malicious activity. mark for My Articles similar articles
Insurance & Technology
January 5, 2007
Larry Greenemeier
The Threat From Within Insiders represent one of the biggest security risks because of their knowledge and access. To head them off, consider the psychology and technology behind attacks. mark for My Articles similar articles
InternetNews
December 9, 2010
Hackers Zero In On Employee Email Accounts Lost or stolen laptops and USB drives are a serious security threat but personal email accounts are becoming an even bigger target for cybercrooks. mark for My Articles similar articles
Wall Street & Technology
August 22, 2007
Melanie Rodier
Employee Fraud Not Being Properly Addressed By Financial Industry, Government, Survey Says Financial institutions widely believe employee fraud to be driven by increased access to technology, poor hiring and screening practices, and organized crime, according to a new survey. mark for My Articles similar articles
HBS Working Knowledge
May 30, 2005
Deepak Malhotra
Six Steps for Making Your Threat Credible Sometimes the best way to make your threat credible is to act in a way that would normally be considered irrational. Restricting your options, sinking money into a potentially useless enterprise, and surrendering authority are the types of behaviors that smart negotiators usually try to avoid. mark for My Articles similar articles
National Defense
January 2014
Stew Magnuson
Rooting Out Insider Threats Among DHS' Top Priorities, Execs Say The Department of Homeland Security's information technology needs in 2014 will be driven by trends such as big data analytics, the ubiquity of mobile devices and a new emphasis on finding insider threats. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles similar articles
Bank Technology News
March 2011
John Adams
Crime-Fighting Budgets Awake from Hibernation Crooks didn't go into recessionary mode, so even with the economy recovering, security officers still feel vulnerable, and with good cause. mark for My Articles similar articles
U.S. Banker
September 2004
Karen Krebsbach
Security: The Inside Job Your employees wouldn't rip you off, right? Think again. Their theft will cost banks $2.4 billion this year. mark for My Articles similar articles
BusinessWeek
July 23, 2009
Lewis Braham
Investing: Profiting from Insider Moves Some pros focus on insider buying and selling as a key indicator of whether individuals should invest in a company's stock. mark for My Articles similar articles
AskMen.com
Mr. Mafioso
How To Make Threats The principles of negotiating with threats can be widely applied, even to business situations. mark for My Articles similar articles
Wall Street & Technology
November 12, 2008
Melanie Rodier
Insider Fraud Is Involed in 60 Percent of Data Breaches Rogue employees have the potential to devastate a bank. But up to 50 percent of all insider fraud incidents go unreported, Celent says. mark for My Articles similar articles
Bank Technology News
April 2008
Andrew Rossetti
Security Requires a Team Effort Only by working together with business units can IT, in its role as data custodians, have a chance of securing data within our organizations. mark for My Articles similar articles
D-Lib
Sep/Oct 2012
Vermaaten et al.
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. mark for My Articles similar articles
InternetNews
February 17, 2006
Clint Boulton
IBM: Security Crucial From The Inside Out IBM unveiled Tivoli Identity Manager Express, a software package that helps small businesses combat insider security attacks and automate compliance management. mark for My Articles similar articles