Blog Posts
Challenges Facing Insider Threat Programs and Hub Analysts: Part 2 of 2
In the first post in this two-part series, we covered five unique challenges that impact insider threat programs and hub analysts. The challenges included lack of adequate training....
• By Jason W. Clark
In Insider Threat
Challenges Facing Insider Threat Programs and Hub Analysts: Part 1 of 2
The purpose of this two-part blog series is to discuss five challenges that often plague insider threat programs and more specifically the analysts that are working in insider threat hubs....
• By Jason W. Clark
In Insider Threat
Employee Termination Procedure (Part 20 of 20: CERT Best Practices to Mitigate Insider Threats Series)
The 20th practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 20: Develop a comprehensive employee termination procedure. In this post, …
• By Jason W. Clark
In Insider Threat
Sentiment Analysis in the Context of Insider Threat
In this blog post, I describe sentiment analysis and discuss its use in the area of insider threat. Sentiment analysis, often referred to as opinion mining, refers to the application …
• By Jason W. Clark
In Insider Threat
The Dark Web and Insider Threat
In this blog post, I describe my attempt to see firsthand the intersection between insider threat and Internet underground forums on the so-called "Dark" or "Deep" Web/Net.
• By Jason W. Clark
In Insider Threat
Common Sense Guide to Mitigating Insider Threats - Best Practice 6 (of 19)
Hello, this is Jason Clark, Insider Threat Researcher for the CERT Program, with the sixth of 19 blog posts that describe the best practices fully documented in the fourth edition …