Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Enemy Within: Managing the Insider Threat

by GTI Editors
March 20, 2014
in Cybersecurity
Reading Time: 2 mins read
A A
Share on FacebookShare on Twitter

Federal agencies are frequent targets for hackers and malicious online adversaries; what greater prize is there than to take down a U.S. government site or, more lucrative still, to steal classified information by breaching an agency network.  While most media attention on cyber security focuses on the threat posed by unknown network assailants, it’s become clear over the last few years that there are just as many threats to the network from inside an organization – from the reality of disgruntled employees to the potential for embedded foreign operatives.   But beyond the recent high profile insider attacks, such as Snowden, Manning, and WikiLeaks, the more frequent insider ‘attack’ that is responsible for the majority of data beaches is usually an act of carelessness, a protocol that’s ignored, or a device that’s lost.

What are some strategies that government agencies can use to protect themselves not only from data spillage, but also from deliberate insider threats?   While the importance of post breach measures, such as forensic analysis are well understood, agencies need to be looking for proactive strategies, such as knowing where data is stored to limit the number of attack surfaces,  that keep them ahead of the attack cycle.  Guidance Software recently hosted a webinar on managing the insider threat.  If you’re interested in learning more about the topic please click here to listen to a replay of the webinar.

Tags: Data LeakageData SpillageDLPEndpoint AnalyticsInsider ThreatMitigating Insider Threat

RELATED POSTS

Deception as a Service, the Next Tool to Add to Your Cyber Arsenal
Cybersecurity

Deception as a Service, the Next Tool to Add to Your Cyber Arsenal

November 6, 2019
Vulnerability
Cybersecurity

What’s the Biggest Vulnerability in Your Enterprise? Insights from Steve LeFrancois of Verizon

August 2, 2019
Data-Driven Enterprise
Cybersecurity

Insider Threats Top List of Cyber Risks, IDC Survey Shows; SolarWinds Tim Brown Cites Need for Human-Centric Response

July 30, 2019
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9396 shares
    Share 3758 Tweet 2349
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    19 shares
    Share 8 Tweet 5
  • Why the Government Needs a Cloud-Native Workforce

    9 shares
    Share 4 Tweet 2
  • The Five Pillars of Zero Trust Architecture

    435 shares
    Share 174 Tweet 109

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us