Summary of the features in StealthWatch 6.5 that protect sensitive data from theft by insider threat or advanced attack.
Some organizations have chosen to adopt a "plausible deniability" strategy to InfoSec. This article outlines some methods of helping these organizations move to a safer security practice.
In the second part of the NBAD series, signature detection methodologies are examined.
The most dangerous and difficult risk to detect to an organization is insider threat. When a trusted asset decides to betray the trust of his benefactor for the sake of ideology, greed or extortion the organization can suffer long lasting damage. This article outlines the nature and strategies of handling insider threat.