search menu icon-carat-right cmu-wordmark

Posts by George Silowash

Building an Insider Threat Program: Some Low-Cost Tools (Part 2 of 2)

Building an Insider Threat Program: Some Low-Cost Tools (Part 2 of 2)

• Blog
George Silowash

This is the second part of a two-part series about considering low-cost tools for starting your insider threat program. In the first part of this series, I discussed the five categories of tools available to insider threat programs to use, as needed, as part of their operations. In this part, I provide examples of low-cost tools that are available in this space....

Read More
Building an Insider Threat Program: Five Important Categories of Tools (Part 1 of 2)

Building an Insider Threat Program: Five Important Categories of Tools (Part 1 of 2)

• Blog
George Silowash

This is the first part of a two-part series that explores open source, free, or low-cost solutions to help you get the technical portion of your insider threat program started. As defined by opensource.com, open source software is "software with source code that anyone can inspect, modify, and enhance." Free tools are available at no cost, but the source code is "closed," meaning that it cannot be examined or modified....

Read More

Contact the Author

George Silowash

SEI Digital Library

SEI Publications

Visit the SEI Digital Library to see other publications by George Silowash

View publications