Quantcast
Browsing latest articles
Browse All 4 View Live

Lifting the fog of war on insider and advanced persistent threats to data

Chief security officers the new battlefield commanders In the fog of war, intelligence is limited, ever subject to the enemy's feints and disinformation, doomed to deliver a murky picture that can...

View Article


The cyber attack kill chain defense

How what the Air Force does applies to cyber security The “Kill Chain” is a traditional warfare term most often used by the US Air Force in defining the command and control process for targeting and...

View Article


Did the NSA do enough to secure its secrets?

How a privileged insider can steal from the NSA -- and how they could have prevented it. Two years ago it was the US Army and Manning, now it's the NSA and Snowden.  The same sad story repeats itself....

View Article

Some Companies Regularly Thwart Insider Theft

Key to preventing these types of threats is understanding when the line has been crossed from legitimate business operation to risky behavior. We're in the midst of our annual survey of our customers...

View Article
Browsing latest articles
Browse All 4 View Live