Similar Articles |
|
National Defense November 2013 Stew Magnuson |
Companies Ill-Prepared to Fend Off Insider Threats Two high-profile cases are putting a spotlight on insider threats in the private sector, particularly companies that do business with the Defense Department, intelligence agencies and other government organizations. |
National Defense February 2015 Sarah Sicard |
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. |
Bank Systems & Technology September 27, 2004 Ivan Schneider |
When Insiders Attack Financial institutions are full of insiders. That's why the Secret Service National Threat Assessment Center (NTAC) and the CERT Coordination Center (CERT/CC) of Carnegie Mellon University's Software Engineering Institute conducted a behavioral and technical study of insiders who committed crimes using information technology. |
InternetNews September 23, 2004 Sean Michael Kerner |
Report: CEOs Stagnant on Security Despite a rash of threats, CEOs are still taking a weak approach to combat IT security problems. |
Inc. April 2009 Kasey Wehrum |
Technology: When IT Workers Attack How to prevent tech sabotage. |
CFO August 1, 2002 Scott Leibs |
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. |
Bank Director 2nd Quarter 2009 Karen Epper Hoffman |
Beware the Inside Job In this time of unprecedented layoffs, massive budget cuts, and related merger activity, banks need to be careful of the security threat that lies within their own organization. |
U.S. Banker December 2009 Glen Fest |
It's a Jungle in There Financially distressed workers are becoming a prime fraud worry for banks. But is it enough to prompt more investment in prevention? |
InternetNews August 25, 2009 |
Measuring and Mitigating the Insider Threat A study finds that no enterprise is immune from the perils of negligence or malicious activity. |
Insurance & Technology January 5, 2007 Larry Greenemeier |
The Threat From Within Insiders represent one of the biggest security risks because of their knowledge and access. To head them off, consider the psychology and technology behind attacks. |
InternetNews December 9, 2010 |
Hackers Zero In On Employee Email Accounts Lost or stolen laptops and USB drives are a serious security threat but personal email accounts are becoming an even bigger target for cybercrooks. |
Wall Street & Technology August 22, 2007 Melanie Rodier |
Employee Fraud Not Being Properly Addressed By Financial Industry, Government, Survey Says Financial institutions widely believe employee fraud to be driven by increased access to technology, poor hiring and screening practices, and organized crime, according to a new survey. |
HBS Working Knowledge May 30, 2005 Deepak Malhotra |
Six Steps for Making Your Threat Credible Sometimes the best way to make your threat credible is to act in a way that would normally be considered irrational. Restricting your options, sinking money into a potentially useless enterprise, and surrendering authority are the types of behaviors that smart negotiators usually try to avoid. |
National Defense January 2014 Stew Magnuson |
Rooting Out Insider Threats Among DHS' Top Priorities, Execs Say The Department of Homeland Security's information technology needs in 2014 will be driven by trends such as big data analytics, the ubiquity of mobile devices and a new emphasis on finding insider threats. |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. |
T.H.E. Journal February 2005 Patrick Hinojosa |
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. |
Bank Technology News March 2011 John Adams |
Crime-Fighting Budgets Awake from Hibernation Crooks didn't go into recessionary mode, so even with the economy recovering, security officers still feel vulnerable, and with good cause. |
U.S. Banker September 2004 Karen Krebsbach |
Security: The Inside Job Your employees wouldn't rip you off, right? Think again. Their theft will cost banks $2.4 billion this year. |
BusinessWeek July 23, 2009 Lewis Braham |
Investing: Profiting from Insider Moves Some pros focus on insider buying and selling as a key indicator of whether individuals should invest in a company's stock. |
AskMen.com Mr. Mafioso |
How To Make Threats The principles of negotiating with threats can be widely applied, even to business situations. |
Wall Street & Technology November 12, 2008 Melanie Rodier |
Insider Fraud Is Involed in 60 Percent of Data Breaches Rogue employees have the potential to devastate a bank. But up to 50 percent of all insider fraud incidents go unreported, Celent says. |
Bank Technology News April 2008 Andrew Rossetti |
Security Requires a Team Effort Only by working together with business units can IT, in its role as data custodians, have a chance of securing data within our organizations. |
D-Lib Sep/Oct 2012 Vermaaten et al. |
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. |
InternetNews February 17, 2006 Clint Boulton |
IBM: Security Crucial From The Inside Out IBM unveiled Tivoli Identity Manager Express, a software package that helps small businesses combat insider security attacks and automate compliance management. |