Blog Posts
Building an Insider Threat Program: Some Low-Cost Tools (Part 2 of 2)
This is the second part of a two-part series about considering low-cost tools for starting your insider threat program. In the first part of this series, I discussed the five …
• By George Silowash
In Insider Threat
Building an Insider Threat Program: Five Important Categories of Tools (Part 1 of 2)
This is the first part of a two-part series that explores open source, free, or low-cost solutions to help you get the technical portion of your insider threat program started. …
• By George Silowash
In Insider Threat
Seven Ways Insider Threat Products Can Protect Your Organization
In the recently released report, Insider Threat Attributes and Mitigation Strategies, I explore the top seven attributes that insider threat cases have according to our database of over 700 insider …
• By George Silowash, CERT Insider Threat Center
In Insider Threat
Controlling the Malicious Use of USB Media
Hello, this is George J. Silowash, Cybersecurity Threat and Incident Analyst for the CERT Division of the Software Engineering Institute. Earlier this year, we released the report Insider Threat Control: …
• By George Silowash, CERT Insider Threat Center
In Insider Threat
Common Sense Guide to Mitigating Insider Threats - Best Practice 16 (of 19)
Hello, this is George J. Silowash, Cybersecurity Threat and Incident Analyst and Lori Flynn, Insider Threat Researcher for the CERT Program, with the sixteenth of 19 blog posts that describe …
• By George Silowash, Lori Flynn, CERT Insider Threat Center
In Insider Threat
Common Sense Guide to Mitigating Insider Threats - Best Practice 1 (of 19)
Hello, this is George J. Silowash, Cybersecurity Threat and Incident Analyst for the CERT Program, with the first of 19 blog posts that describe the best practices fully documented in …
• By George Silowash, CERT Insider Threat Center
In Insider Threat
The Common Sense Guide to Mitigating Insider Threats Expanded
Hi, this is George Silowash of the CERT Insider Threat Center. I am happy to announce the release of the Common Sense Guide to Mitigating Insider Threats, 4th Edition. This …
• By George Silowash, CERT Insider Threat Center
In Insider Threat
Data Exfiltration and Output Devices - An Overlooked Threat
Hi, this is George Silowash and recently, I had the opportunity to review our insider threat database looking for a different type of insider threat to the enterprise...paper.
• By George Silowash, CERT Insider Threat Center
In Insider Threat
Insider Threat Best Practices from Industry
Hello, this is George Silowash from the Insider Threat Center at CERT. I had the opportunity to attend RSA Conference 2011 with two of my colleagues, Dawn Cappelli and Joji …