When Army intelligence specialist Chelsea Manning leaked classified documents to WikiLeaks in 2010, the federal government's security clearance process served as the main defense against malicious insiders. CERT's Randy Trzeciak explains how insider threat defenses have changed since then.
A report on passage by the House of Representatives of a bill aimed at toughening insider threat defenses at the Department of Homeland Security leads the latest edition of the ISMG Security Report. Also, analyzing the use of blockchain technology to secure healthcare data.
This ISMG Security Report leads with comments from President Donald Trump that suggest the U.S. military will take the lead in defending civilian-owned critical infrastructure. Also, how insider defenses changed since Chelsea Manning's WikiLeaks data dump.
President Barack Obama has shortened the sentence of U.S. Army leaker Chelsea Manning, who passed classified documents to WikiLeaks. The move comes as the government grapples with the nuances of data leaks.
Leading this latest edition of the ISMG Security Report: The growing momentum in Congress to establish a select committee to investigate breaches the American intelligence community has tied to the Kremlin to influence the U.S. presidential election.
Former NSA contractor Harold T. Martin III., who is accused of pilfering mass quantities of highly classified information, will remain in jail until his trial. Martin engaged in "a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors say.
An NSA contractor who worked for Booz Allen Hamilton has been accused of stealing top-secret documents that the U.S. says could endanger national security. The documents are critical to a "wide variety of national security issues," the Department of Justice says.
Bank of the West's new approach to the insider threat is focused less on detection, more on preventing fraud in the first place. David Pollino tells why a "noisy" insider fraud program is more effective than covertly monitoring employee activity.
The insider threat is a dangerous risk to government agencies and their most sensitive data. Monitoring the behaviors internally and identifying corrupt situations based on access, roles and actions is not a luxury government agencies can afford to go without.
Read our detailed white paper on building a case to...
The term Insider Threat brings to mind the malicious employee, motivated by either money or politics to steal data that can be sold on a black market or used to damage the organization's reputation.
According to a Ponemon report, unintentional employee negligence severely diminishes the productivity of the...
When desktops ruled the enterprise, employers may not have claimed to have absolute control over their workers' usage of technology and data, but they surely could contain it. Whether overtly or tacitly, leadership has now empowered its employees. Thanks to mobility, the cloud and other advancements, workers decide...
As a technology professional, you know that data, network and system failures aren't your biggest problems. It's the humans who interact with these systems that cause the issues.
High-risk insider threats - malicious, careless or negligent employees - are one of the main causes of data breaches. Most of the time,...
Close on the heels of the QNB leak, the same attackers have published data that appears to be from UAE-based InvestBank. The dump appears to contain payment card data, as well as a large number of sensitive, internal files relating to the bank's employees and systems.