Showing 1 - 10 of 30 results for the insider threat Type - White Paper
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
This paper identifies steps that organizations can use to enhance their security posture to detect potential insider threats.
In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.
In this paper, the authors describe how state-of-the-art multi-media technologies were used to develop the MERIT InterActive training simulator.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
In this paper, the authors explain how cloud computing related insider threats are a serious concern, but that this threat has not been thoroughly explored.
This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.
In this paper, the authors describe the MERIT insider threat model and simulation results.
In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.