Lifting the fog of war on insider and advanced persistent threats to data
Chief security officers the new battlefield commanders In the fog of war, intelligence is limited, ever subject to the enemy's feints and disinformation, doomed to deliver a murky picture that can...
View ArticleThe cyber attack kill chain defense
How what the Air Force does applies to cyber security The “Kill Chain” is a traditional warfare term most often used by the US Air Force in defining the command and control process for targeting and...
View ArticleDid the NSA do enough to secure its secrets?
How a privileged insider can steal from the NSA -- and how they could have prevented it. Two years ago it was the US Army and Manning, now it's the NSA and Snowden. The same sad story repeats itself....
View ArticleSome Companies Regularly Thwart Insider Theft
Key to preventing these types of threats is understanding when the line has been crossed from legitimate business operation to risky behavior. We're in the midst of our annual survey of our customers...
View Article