Whilst there have been some recent high profile examples of insider threat attacks, the reality is most insider threats are inconspicuous and unintentional. However, they can still cause crippling amounts of damage to an enterprise and can prove extremely costly. This eBook outlines the who, what and why of insider threats and takes a closer look at the risks you might not have considered to help you prevent and detect these attacks.
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership