sponsored by Imperva
Posted:  04 Feb 2011
Published:  04 Feb 2011
Format:  PDF
Length:  9  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased. It’s no wonder that we’re hearing about a growing number of attacks where the target is sensitive data, and the perpetrators are those with evaluated levels of trust and access:insiders. For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside.

Today, most organizations would agree that their most valuable IT assets reside within applications and databases. Most would probably also agree that these are areas that have the weakest levels of security, thus making them the prime target for malicious activity from system administrators, DBAs, contractors, consultants,partners, and customers.






BROWSE RELATED RESOURCES
Audit Trails | Classification (Information Management) | Crime | Data Security | Database Security | Security Threats | Web Application Security

View All Resources sponsored by Imperva

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement