Policy & Practice

insider threat

Companies across a wide spectrum of industries continue to wrestle with how to implement a well-designed insider threat program. The US government has provided guidelines that help but, as we’ve…

insider threat

Is Lord Varys, the enigmatic eunuch, a threat to Daenerys Targaryen’s army? As any Game of Thrones fan knows, Varys is currently an advisor to Daenerys. With the help of…

The explosive growth of cloud-based services and mobile devices in the workplace has rendered conventional approaches to cybersecurity risk management virtually obsolete, requiring a more adaptive and continuous strategy towards…

Security analytics

Companies take time to screen their potential employees during the application process, and government-job seekers undergo many additional investigative procedures, too. And yet once an individual is hired, the vetting…

Insider threat

Last fall, just three years after the massive Edward Snowden leak, Harold Martin III – another government contractor – was charged with allegedly stealing highly classified documents from the National…

Insider Threat, Security Analytics

Many policy objectives were ardently debated throughout the 2016 presidential election cycle and became polarizing issues, dividing people chiefly along party lines. By contrast, the twin issues of improved insider…

Cyber security

In earlier blogs, (here and here) we discussed weaknesses of the new industrial insider threat program regulation, the National Industrial Security Operating Manual (NISPOM) Change 2. As the November 30…

cybersecurity; insider threat; white house

Detecting insider threats before they cause harm is, of course, a daunting challenge. In response, the US government has moved aggressively over the last five years to deploy tools on…

Insider Threat, Security Analytics

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…