We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Download the Insider Threat Deep Dive Report

A wide range of detection and prevention countermeasures can vastly reduce the threat of malicious activity by insiders. Learn which work best and how to deploy them for maximum effect

Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.

In this Deep Dive special report, InfoWorld takes you through the three stages of dealing with insider threats:

Along the way, our expert covers the importance of event logs, data leak detection/prevention products, and honeypots, as well as new considerations stemming from the rise of cloud computing. Finally, you'll get a list of tools and techniques your business can adopt to stop insider threats before they begin.

Download the "Insider Threat Deep Dive Report" for all this info and more. It's hard enough fighting outside hackers and scammers who want to penetrate your company's security -- make sure you aren't battling destructive forces within your business as well.

InfoWorld has an abundance of security resources for the tech professional. Dig into InfoWorld's trove of real-world enterprise security knowledge:

Stay up on the latest security developments in InfoWorld's Security channel.


IDG UK Sites

Samsung Galaxy Note 4 review: Great if you like big, expensive phones

IDG UK Sites

Why Sony's PS4 2.0 update is every gamer's dream (well, mine at least)

IDG UK Sites

This Grolsch ad combines stop-motion & CG for majestic results

IDG UK Sites

Apple rumours and predictions for 2015: What to expect from Apple in 2015