
Companies across a wide spectrum of industries continue to wrestle with how to implement a well-designed insider threat program. The US government has provided guidelines that help but, as we’ve…

Is Lord Varys, the enigmatic eunuch, a threat to Daenerys Targaryen’s army? As any Game of Thrones fan knows, Varys is currently an advisor to Daenerys. With the help of…

The explosive growth of cloud-based services and mobile devices in the workplace has rendered conventional approaches to cybersecurity risk management virtually obsolete, requiring a more adaptive and continuous strategy towards…

Companies take time to screen their potential employees during the application process, and government-job seekers undergo many additional investigative procedures, too. And yet once an individual is hired, the vetting…

Last fall, just three years after the massive Edward Snowden leak, Harold Martin III – another government contractor – was charged with allegedly stealing highly classified documents from the National…

Many policy objectives were ardently debated throughout the 2016 presidential election cycle and became polarizing issues, dividing people chiefly along party lines. By contrast, the twin issues of improved insider…

In earlier blogs, (here and here) we discussed weaknesses of the new industrial insider threat program regulation, the National Industrial Security Operating Manual (NISPOM) Change 2. As the November 30…

Detecting insider threats before they cause harm is, of course, a daunting challenge. In response, the US government has moved aggressively over the last five years to deploy tools on…

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…