We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
78,721 News Articles

Download the Insider Threat Deep Dive Report

A wide range of detection and prevention countermeasures can vastly reduce the threat of malicious activity by insiders. Learn which work best and how to deploy them for maximum effect

Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.

In this Deep Dive special report, InfoWorld takes you through the three stages of dealing with insider threats:

Along the way, our expert covers the importance of event logs, data leak detection/prevention products, and honeypots, as well as new considerations stemming from the rise of cloud computing. Finally, you'll get a list of tools and techniques your business can adopt to stop insider threats before they begin.

Download the "Insider Threat Deep Dive Report" for all this info and more. It's hard enough fighting outside hackers and scammers who want to penetrate your company's security -- make sure you aren't battling destructive forces within your business as well.

InfoWorld has an abundance of security resources for the tech professional. Dig into InfoWorld's trove of real-world enterprise security knowledge:

Stay up on the latest security developments in InfoWorld's Security channel.


IDG UK Sites

Motorola Moto G2 release date, price and specs: Best budget smartphone gets upgrades

IDG UK Sites

How to join Apple's OS X Beta Seed Program: Get OS X Yosemite on your Mac before public release

IDG UK Sites

Why the BBC iPlayer outage was caused by a DDoS attack: Topsy and Tim isn't *that* popular

IDG UK Sites

How to make an 'Apple iWatch' using an iPod nano and a 3D printer