Showing 1 - 10 of 177 results for the Threat
Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.
This report describes how positive incentives complement traditional practices to provide a better balance for organizations‰ insider threat programs.
This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.
This catalog describes SEI training and certificates that help you tackle today's software, systems, and cybersecurity challenges.
In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.
This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.
As they constantly change network infrastructure, adversaries consistently use and update the tools they use. This report presents a way for researchers to begin threat analysis with those tools rather than with network or incident data alone.
In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.
In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.
In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.