Threatpost Spotlight: Insider Threats

Threatpost Spotlight: Insider Threats

By: Threatpost
Published: July 2011

If Firewalls, antivirus software and intrusion detection tools keep out stealthy attackers,
how does a company square off against rogue insiders?

That’s a pressing question and one that’s garnering more attention as the number of high profile insider
attacks mounts, and as government and private sector regulators take steps to clamp
down on malicious insiders.

To help you understand the insider threat better, Threatpost has put together this Spotlight on insider threat attacks that can help you begin to tailor your protections and policies to stop malicious insiders

Please register to download "Threatpost Spotlight: Insider Threats" and other valuable information from Kaspersky Lab.