search menu icon-carat-right cmu-wordmark

Insider Threat Blog

Real-World Work Combating Insider Threats

Latest Posts

Insiders and Organized Crime

Insiders and Organized Crime

• Insider Threat Blog
CERT Insider Threat Center

The term organized crime brings up images of mafia dons, dimly lit rooms, and bank heists. The reality today is more nuanced; especially as organized crime groups have moved their activities online. The CERT Insider Threat Center recently released a publication titled Spotlight On: Malicious Insiders and Organized Crime Activity. This article focuses on a cross-section of CERT's insider threat data, incidents consisting of 2 or more individuals involved in a crime. What we found...

Read More
Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage

Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage

• Insider Threat Blog
CERT Insider Threat Center

The Insider Threat Center at CERT recently released a new insider threat control that is specifically designed to detect the presence of a malicious insider based on key indicators to Information Technology (IT) sabotage activity. This blog post provides an overview of the control and the rationale behind its development. For more details describing the development of the control and the statistical analysis used and applied in this signature please refer to the technical report:...

Read More
Preparing for Negative Workplace Events - Managing Employee Expectations

Preparing for Negative Workplace Events - Managing Employee Expectations

• Insider Threat Blog
CERT Insider Threat Center

Hello, this is Randy Trzeciak, technical team lead for the Insider Threat Research Team at the CERT Insider Threat Center. This blog post is intended to serve as a reminder to organizations about the impact that an organization's actions can have on employees. Additionally, I want you to ask yourself the following question, what are you doing to manage employee expectations during negative workplace events?...

Read More
Insider Threat Controls

Insider Threat Controls

• Insider Threat Blog
CERT Insider Threat Center

The mission of the CERT Insider Threat Lab, sponsored by the Department of Homeland Security Federal Network Security Branch, is to create new technical controls and standards based on our research, as well as to determine lessons learned from our hands-on work doing assessments, workshops, and working with technical security practitioners....

Read More
Data Exfiltration and Output Devices - An Overlooked Threat

Data Exfiltration and Output Devices - An Overlooked Threat

• Insider Threat Blog
CERT Insider Threat Center

Hi, this is George Silowash and recently, I had the opportunity to review our insider threat database looking for a different type of insider threat to the enterprise...paper. Yes, paper. In particular, printouts and devices that allow for extraction of digital information to paper or the management of paper documents. This area is often overlooked in enterprise risk assessments and I thought I would share some information regarding this type of attack....

Read More
The CERT Insider Threat Database

The CERT Insider Threat Database

• Insider Threat Blog
CERT Insider Threat Center

Hi, this is Randy Trzeciak, technical team lead for the Insider Threat Outreach & Transition group at the Insider Threat Center at CERT. Since 2001, our team has been collecting information about malicious insider activity within U.S. organizations. In each of the incidents we have collected, the insider was found guilty in a U.S. court of law....

Read More
Theft of Intellectual Property and Tips for Prevention

Theft of Intellectual Property and Tips for Prevention

• Insider Threat Blog
CERT Insider Threat Center

One of the most damaging ways an insider can compromise an organization is by stealing its intellectual property (IP). An organization cannot underestimate the value of its secrets, product plans, and customer lists. In our recent publication, An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases, we took a critical look at the technical aspects of cases in which insiders who stole IP from their organization. Insiders commit these crimes for various...

Read More
Insider Threat Deep Dive: Theft of Intellectual Property

Insider Threat Deep Dive: Theft of Intellectual Property

• Insider Threat Blog
CERT Insider Threat Center

This entry is part of a series of "deep dives" into insider threat. The previous entry focused on IT sabotage. Hi, this is Chris King. From our research, we realized that malicious insiders do not all fit into a single category. We found that there are individuals who steal or commit fraud for financial gain, others who steal intellectual property because of a sense of entitlement or to obtain a position with a competitor, and...

Read More