by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : June 15, 2015
T he insider threat is a pervasive security problem for all organizations, and has been from the beginning of the Internet age. While various technology solutions have been used to deal with threats from outside the enterprise perimeter, little seems to have worked to counter those from the inside. As mobile devices proliferate, and as the limits of the perimeter grow with the use of cloud services, the notion of how, where, why and by whom an organization’s systems and data are accessed will also have to expand. Insiders then become not just the organization’s employees, but also contractors, collaboration partners, occasional users and even malicious actors that penetrated peripheral defenses. In its well-regarded Annual Data Breach Investigations Report for 2015, Verizon Inc. found that just fewer than 21 percent of all reported attacks were due to insider misuse. Over half of those attacks were due to an insider’s deliberate abuse of access privileges. Not too far behind were inadvertent breaches such as when, by mistake or inattention, someone sends a sensitive document over an unsecured link. Vormetrics’ 2015 Insider Threat Report found that 93 percent of the US IT decision makers polled consider their organizations at least somewhat, if not more, vulnerable to insider threats. Six out of 10 believed privileged insiders posed the greatest threat. Other studies point to a paradox in the way organizations react to this. A December 2014 survey by Market Connections, for example, found most of the government IT executives questioned considered insider threats at least as damaging as those from the outside, and in many cases much more so. Yet investments to combat those outside threats far exceeded those for insiders. So many people these days view security as an interference to them doing their jobs and also have the skills to get around security protocols, a Defense Contract Management Agency executive said, and “people do what they want to do.” However, government agencies are now under orders to improve their insider threat defenses. Rattled by the 2010 WikiLeaks dump of sensitive government information, followed several years later by the Edward Snowden revelations, President Obama in 2012 issued a memo to heads of all executive departments and agencies requiring them to adopt “minimum standards” necessary to establish effective insider threat programs. Solving the Cybersecurity Threat Puzzle Shutterstock.com SPECIAL REPORT OBJECT-BASED INTELLIGENCE Sponsored Content
May 30, 2015
June 30, 2015