The Insider Threat - How Privileged Users Put Critical Data at Risk

Jan 31, 2014

This white paper discusses the growing insider risks. It will also cover how organizations become breached—either by internal users through malicious or benign actions or from external threats that acquire the credentials of trusted insiders. It also touches on how organizations can limit privileged users’ access to data so that, in either case, sensitive information does not leave your organization in an unencrypted state. Finally, it shows how organizations can implement technologies to protect data by decrypting at the point of use, and setting rules on who can see unencrypted data.


What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
 Top 100 Slideshow
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts