Posted on by Insider Threatin
Hi, this is Dawn Cappelli of the CERT Insider Threat Center. We always feel proud when we see others recognize our hard work and, better yet, communicate the results of our work to others. SC Magazine, FedTech, Information Week, eWeek, and GovInfoSecurity have all published articles about the work that the CERT Insider Threat Center has done. We've collected excerpts from each here with a link to the complete article so you can take a look.
Danger Within: Insider Threat (SC Magazine)
Dawn Cappelli of the of the CERT Insider Threat Center says that many organizations are focused on protecting their networks from outside threats, but they don't have anyone in charge of insider threat mitigation. She says that using a combination of technical and nontechnical controls can help organizations greatly increase their chances of mitigating malicious activity.
Data Loss Prevention: How to Stop Inside Jobs (FedTech)
Think outsiders represent the greatest threat to an organization's systems? Think again. Statistics from the 2011 CyberSecurity Watch Survey validate the presence of insider threats.
10 Best Ways to Stop Insider Attacks (Information Week)
Consider the smartest ways that companies can detect, block, and investigate insiders with malicious motives. The advice comes from CERT and the Secret Service, after a review of hundreds of attacks.
Insider Security Threats - 10 Tactics to Stop These Data Breaches (eWeek)
The full version of 2012 Verizon Data Breach Investigation Report is being released soon. However, the report's preliminary findings show that a vast majority of data breaches in 2011 were the result of outsiders trying to break in for malicious purposes.
Insider Threat: Emerging Risk (GovInfoSecurity)
For years, people have been concerned about malicious insider threats. But an emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider, says Dawn Cappelli of Carnegie Mellon University.