MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
July 2014
Stew Magnuson
Funding Not Following Concerns About Insider Threats Spies, disgruntled workers and intellectual property thieves have always been a problem in both government and private sector organizations. mark for My Articles similar articles
National Defense
February 2015
Sarah Sicard
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. mark for My Articles similar articles
National Defense
January 2014
Stew Magnuson
Rooting Out Insider Threats Among DHS' Top Priorities, Execs Say The Department of Homeland Security's information technology needs in 2014 will be driven by trends such as big data analytics, the ubiquity of mobile devices and a new emphasis on finding insider threats. mark for My Articles similar articles
Inc.
April 2009
Kasey Wehrum
Technology: When IT Workers Attack How to prevent tech sabotage. mark for My Articles similar articles
U.S. Banker
December 2009
Glen Fest
It's a Jungle in There Financially distressed workers are becoming a prime fraud worry for banks. But is it enough to prompt more investment in prevention? mark for My Articles similar articles
Insurance & Technology
January 5, 2007
Larry Greenemeier
The Threat From Within Insiders represent one of the biggest security risks because of their knowledge and access. To head them off, consider the psychology and technology behind attacks. mark for My Articles similar articles
CFO
August 1, 2002
Scott Leibs
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. mark for My Articles similar articles
CIO
June 1, 2002
Sarah D. Scalet
Dr. Crime's Terminal of Doom Most computer attacks come from the outside. But the costliest ones come from the inside. Here's how to manage the risk without making honest employees feel like crooks mark for My Articles similar articles
U.S. Banker
September 2004
Karen Krebsbach
Security: The Inside Job Your employees wouldn't rip you off, right? Think again. Their theft will cost banks $2.4 billion this year. mark for My Articles similar articles
HBS Working Knowledge
May 30, 2005
Deepak Malhotra
Six Steps for Making Your Threat Credible Sometimes the best way to make your threat credible is to act in a way that would normally be considered irrational. Restricting your options, sinking money into a potentially useless enterprise, and surrendering authority are the types of behaviors that smart negotiators usually try to avoid. mark for My Articles similar articles
Information Today
July 16, 2013
Nancy K. Herther
PRISM and the First Amendment: A Critical Issue Once Edward Snowden lands in some friendly country or decides to return to the U.S., we can hope that attention is again focused on PRISM and surveillance. So far, the responses from government officials have been less than stellar. mark for My Articles similar articles
Salon.com
April 26, 2001
Fiona Morgan
Does the U.S. spy too much? In the wake of the spy plane flap with China, experts propose international rules of order that would limit excessive espionage... mark for My Articles similar articles
The Motley Fool
July 16, 2004
Tom Gardner
Martha Stewart, Was It Insider Trading? She was convicted of perjury, but did she make an illegal stock trade? Investment Intelligence from Insider Trading author weighs in. mark for My Articles similar articles
BusinessWeek
June 28, 2004
Paul Magnusson
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. mark for My Articles similar articles
D-Lib
Sep/Oct 2012
Vermaaten et al.
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. mark for My Articles similar articles
Wall Street & Technology
August 20, 2007
Melanie Rodier
Traditional Investigation Methods and New Tech Help Catch Insider Traders As insider trading rises globally, regulators and banks are using complex event processing and remote-control software to catch rogue traders. mark for My Articles similar articles