If Firewalls, antivirus software and intrusion detection tools keep out stealthy attackers,
how does a company square off against rogue insiders?
That’s a pressing question and one that’s garnering more attention as the number of high profile insider
attacks mounts, and as government and private sector regulators take steps to clamp
down on malicious insiders.
To help you understand the insider threat better, Threatpost has put together this Spotlight on insider threat attacks that can help you begin to tailor your protections and policies to stop malicious insiders