Preventing Insider Sabotage : Lessons Learned from Actual Attacks

or former employees or contractors
who intentionally exceeded or misused an authorized level of access to
networks, systems or data in a manner that targeted a specific
individual or affected 
the security of the organization's data,
systems and/or daily business operations.

Good study by CERT presented at this year's CSI conference. Lots of interesting statistics.  Posted on Astalavista.


Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s