Tag Archives: insider threat

Intent

There’s a whole bunch of the IDC/RSA white paper on insider risk management that puzzles me on one level or another. “Whether the threats are accidental or deliberate, the costs are still the same.” I didn’t see much data in … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Policy and Ethics

The excellent Grits for Breakfast posted several stories of alleged misbehavior at the Bexar County probation office, including a link to the following story from the San Antonio Current. The following passage caught my attention: According to former Bexar County … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Fillings

Dental countdown: 4. Juicy stuff from re: The Auditors on SocGen. Latest news out of France has Finance Minister Christine’s Lagarde’s report saying that in addition to controls being lax, (duh!), someone who understand the controls should have never been … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Impacted Molars: Pay Hell Gettin’ It Done Edition

Random Eye-tooth:I’ve been reading the Counterinsurgency Manual, and I’m figuring there is some analogue to a corporate approach to minimize the “insider threat.” Extraction:Mr. Loblaw describes a grisly example of privacy abuse in a recent decision du jour, selecting the … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

The Italian Job

Odd ball kidnapping heist documented at MCN and Roadracing World illustrates the danger of the insider beyond the pilfered laptop or unexpired system credentials. Apparently the Alto Evolution World Superbike team “reduced the responsibilities” of Sergio Bertocchi, their erstwhile manager, … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Insider Threat Assessment

Step one: Play a crappy new-agey cover of “All Along the Watchtower.”

Posted in Uncategorized | Tagged , | Leave a comment

Panopticon Enabled Desktops Increase Productivity!

From Dark Reading, the joys of workforce monitoring software with Ascentive!: “We call it ‘workforce activity management,’” says Schran. “Our latest edition provides all the insight necessary to eliminate time-wasting, increase productivity, and protect private company data.” Or, in the … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

It’s the Crime, Not the Tool

Tim Wilson at Dark Reading on IT Security: The New Big Brother: “To identify potential insider threats, IT must monitor end users’ behavior by scanning email, tracking network activity, and even watching employees for “trigger” events that might cause disgruntlement. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment