Blog Posts
Assets and Information in the Insider Threat Indicator Ontology
Insider threat programs can better implement controls and detect malicious insiders when they communicate indicators of insider threat consistently and in a commonly accepted language....
• By Michael J. Albrethsen
In Insider Threat
Data Management and Event Correlation (Part 12 of 20: CERT Best Practices to Mitigate Insider Threats Series)
The twelfth practice described in the newly released Common Sense Guide to Mitigating Insider Threats is Practice 12: Deploy solutions for monitoring employee actions and correlating information from multiple data …
• By Michael J. Albrethsen
In Insider Threat
Defending Against Phishing
When IT and security professionals discuss phishing, the need for improved user education is often the main focus. While user education is vital and can lead to faster discovery of …