In 2017, the insider threat epidemic begins

Cover Image

Insider threats begin with trusted employees whose frustration, resentment, apathy, lack of cyber security training and awareness, or external motivations radicalise them to unintentionally or willfully inflict harm on the organisation by compromising systems, assisting external cyber threat actors in multi-vector information warfare, or exfiltrating treasure troves of valuable PII, PHI, and other sensitive data.

Perimeter-based defences cannot stop the threats that are already inside the network. Bleeding-edge defence-grade insider threat solutions, such as user and entity behavioral analytics (UEBA), identity and access management (IAM), virtualisation and user activity monitoring (UAM) are necessary to detect, deter and mitigate the mounting insider threat epidemic against critical infrastructure.

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Feb 28, 2017
Format:
PDF
Type:
Essential Guide
Already a Bitpipe member? Log in here

Download this Essential Guide!