Whilst there have been some recent high profile examples of insider threat attacks, the reality is most insider threats are inconspicuous and unintentional. However, they can still cause crippling amounts of damage to an enterprise and can prove extremely costly. This eBook outlines the who, what and why of insider threats and takes a closer look at the risks you might not have considered to help you prevent and detect these attacks.
Mark Chillingworth on IT leadership
Phil Muncaster reports on China and beyond
Kathryn Cave looks at the big trends in tech