Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Mitigating insider threats - a technical perspective

Brian Contos | July 8, 2016
Brian Contos gives us his point of view towards insider threats

Best practices toward mitigating data loss is to protect information at its source. Security technologies help mitigate the insider threat by monitoring and analyzing data access patterns in order to alert on those anomalous activities that fall outside accepted norms.

It must be remembered that insiders are human beings, and as such, their thoughts and activities are constantly changing and altering. Therefore, security practitioners must always think dynamically when it comes to trying to develop solutions to counter this threat. Implementing technology solutions at different levels and overlapping functions will best cast a tight-weave security net to catch suspicious behavior prior to a major security incident.

Source: CSO Australia

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.