The three types of individuals that constitute the insider threat
Forcepoint's Neil Thacker says you need to put people first when developing security strategy

The malicious insider is not the biggest threat
Insider threats are an increasingly common focus for IT security professionals as the old fortification model of defence gives way to a data centric, intelligence led approach. But who are the insiders...
More on Threats and Risks
GCHQ will use AI to combat child abuse and human trafficking
GCHQ has committed to using AI in a 'fair and transparent' way
China-linked Jian spyware was copied from NSA code, researchers
The APT31 group cloned a cyber-offensive tool developed by the NSA to create Jian, which was then used against a US target
'Silent stealing': cyber fraudsters expand mass, low-return operations in the pandemic
Criminals are targeting hundreds of thousands of individuals for as little as £10, reasoning that such thefts are less likely to be reported
'Silver Sparrow' malware infects about 30,000 Macs worldwide
But so far the new attack does...nothing
Credential spills have doubled in the last four years
'Credential spills are like an oil spill: once leaked, they are very hard to clean up'
Back to Top