Topics: Insider Threat
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
Topics: Insider Threat
This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.
Topics: Insider Threat
This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.
Topics: Insider Threat
In this paper, the authors describe their ongoing development of an insider threat indicator ontology.
Topics: Insider Threat
In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.
Topics: Insider Threat
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.
Topics: Insider Threat
In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.
Topics: Insider Threat
In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.
Topics: Insider Threat
In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.