A federal district court judge's ruling that a National Security Agency program collecting metadata from telephone calls could be unconstitutional suggests that the law hasn't kept pace with changing technology.
NSA Director Gen. Keith Alexander says the agency has taken 41 actions to prevent leaks by insiders in the wake of disclosures of classified documents about the agency's surveillance programs by former agency contractor Edward Snowden.
You can be outraged that the NSA collects Internet communications records of U.S. citizens. But don't be surprised, says sociologist William Staples. This is just one example of our "culture of surveillance."
More than half of surveyed organizations say they have experienced an insider incident, and 53 percent say insider attacks are more damaging than those launched externally. So, what can security leaders do to get a better handle on the insider threat in 2014? Join this expert panel, led by Michael Theis of the CERT...
In mitigating insider threats, technology should be used in conjunction with information sharing and risk-prevention business practices, says Jason Clark, a researcher at Carnegie Mellon University.
For years, researchers have studied malicious insider threats. But how can organizations protect themselves from insiders who make a mistake or are taken advantage of in a way that puts the organization at risk?
An arrest has been made in a major insider fraud case at a small banking institution in Ohio. One fraud-fighting expert says this scheme should never have flown under the radar of banking regulators.
The average insider scheme lasts 32 months before it's detected, says threat researcher Jason Clark, who suggests using a combination of the right technologies and the right processes is the key to improving detection.
Randy Trzeciak and his CERT Insider Threat Center colleagues are working to broaden the definition of the insider threat to incorporate not just the risk to information and IT but to facilities and people, too.
To address the insider threat, Jeremy Walczak of Independent Health is using a privileged identity management system. Walczak and other experts offer detailed insights on mitigating emerging threats.
The author of the forthcoming book "Secrets and Leaks" explains why the acts of NSA whistleblower Edward Snowden don't carry the same weight as those of Pentagon Papers leaker Daniel Ellsberg.
Former White House privacy counselor Peter Swire says the time is right to re-evaluate the checks and balances surrounding government programs that collect data on American citizens.
What are the costs involved with defending against the insider threat? Randy Trzeciak and George Silowash of Carnegie Mellon University's CERT Insider Threat Center offer insights.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Here are some questions we'd like to ask the former systems administrator at the National Security Agency to learn more about the motivation behind his leak of the U.S. government's top-secret information collection programs.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.