Showing 1 - 8 of 8 results for the Author - david mcintire
In this report, the authors describe a pattern-based approach to designing insider threat programs that could provide a better defense against insider threats.
In this report, the authors present results of the Malware Analysis Lexicon (MAL) initiative, which developed the first common vocabulary for malware analysis.
In this report, the authors present the Competency Lifecycle Roadmap and the readiness test development method, both used to maintain workforce readiness.
In this report, the authors justify applying the pattern “Increased Review for Intellectual Property (IP) Theft by Departing Insiders.”
This report describes line-funded exploratory new starts (LENS) projects that were conducted during fiscal year 2012 (October 2011 through September 2012).
In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.
In this paper, the authors describe four patterns of insider IT sabotage mitigation and initial results from 46 relevant cases for pattern effectiveness.
In this report, the authors describe insights and risk indicators of malicious insider activity in the banking and finance sector.