Mission Assurance
Blog Posts
How to Mitigate Insider Threats by Learning from Past Incidents
This post summarizes a new best practice added to the new 7th edition of the Common Sense Guide to Mitigating Insider Threats, "Learn from Past Insider Threat Incidents."
Read More•By Daniel L. Costa
In Insider Threat
Benford's Law: Potential Applications for Insider Threat Detection
Learn how a mathematical law may help detect insider activity without the effort of traditional anomaly detection in this informative SEI Blog post
Read More•By Emily Kessel
In Insider Threat
Insider Threat Incidents: Assets Targeted by Malicious Insiders
This SEI Blog post details CERT's new taxonomy for targeted assets in insider threat incidents and highlights their latest findings.
Read More•By Sarah Miller
In Insider Threat
Highlights from the 7th Annual National Insider Threat Center (NITC) Symposium, Day One
This SEI Blog post recaps the first day of the National Insider Threat Symposium, covering proactive approaches to reducing insider incidents.
Read More•By Daniel L. Costa, Sarah Miller
In Insider Threat
Insider Threat Incidents: Communication Channels
Learn how to identify risk behaviors and detect insider threats with communication channel monitoring in this informative SEI Blog post.
Read More•By Sarah Miller, Alex Pickering
In Insider Threat
Insider Threat Incidents: Most Commonly Affected Devices
Learn about the most common devices affected by insider threat incidents and their impact on insider risk management and incident response in this SEI Blog post.
Read More•By Sarah Miller, Alex Pickering
In Insider Threat
Organizational Resilience to Insider Threats
This SEI Blog post explores the activities of the CERT National Insider Threat Center and offers strategies for operational resilience.
Read More•By Daniel L. Costa
In Insider Threat
Functional Requirements for Insider Threat Tool Testing
Because of the scope and scale of the insider threat, the SEI recommends that organizations adopt a use-case-based approach to insider risk mitigation....
Read More•By Robert M. Ditmore, Derrick Spooner
In Insider Threat
Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning
The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....
Read More•By Jonathan Spring
In CERT/CC Vulnerabilities
Maturing Your Insider Threat Program into an Insider Risk Management Program
Having trouble clearly stating the scope of your insider threat program? Struggling with measuring the program's effectiveness? Failing to provide actionable intelligence to the program stakeholders?...
Read More