Whilst there have been some recent high profile examples of insider threat attacks, the reality is most insider threats are inconspicuous and unintentional. However, they can still cause crippling amounts of damage to an enterprise and can prove extremely costly. This eBook outlines the who, what and why of insider threats and takes a closer look at the risks you might not have considered to help you prevent and detect these attacks.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond