Education, Awareness at the Center of U.S.' First Insider Threat Month
Federal agencies are spreading awareness around the threats insiders can pose to both governments and companies this month.
Federal agencies are spreading awareness around the threats insiders can pose to both governments and companies this month.
This company protected its sensitive data with biometric thumbprint scanner but still managed to suffer trade secret theft after a former director of research allegedly stole gigabytes of data on its recipes.
Like many companies developing self-driving car technology, Tesla and its embattled CEO Elon Musk continue to fight data theft within its ranks.
Verizon's new Insider Threat Report breaks down five categories of inside threat actors and outlines 11 steps to reduce risk and defend against malicious insiders.
Federal agents apprehended a former Apple employee last week suspected of stealing intellectual property, including engineering schematics on the company's secret self-driving car technology.
Tesla filed a lawsuit against a former employee this week after it learned he made changes to company source code and exported gigabytes of proprietary data to unknown third parties.
Learn about what an insider threat analyst does, along with how they affect existing procedures, policies, and protection layers in organizations in Data Protection 101, our series on the fundamentals of information security.
Whether malicious or negligent, insider threats pose serious security problems for organizations. Forrester Senior Security Analyst Joseph Blankenship offers some insight into common early indicators of an insider threat.
Global cybercrime costs could reach $2 trillion by 2019. That’s up 3X from 2015, which was only a paltry $500 billion by comparison. Surprisingly, though, hackers should be the least of your worries.
A House Oversight Report Suggests the Zero Trust Model for Government Networks. What does that mean? And will it work?