Blog
Insider Enterprise Threats: User Activity Monitoring
By Justin Sherman on Sun, 02/25/2018
This article is part 1 of 3 in the “Insider Enterprise Threats” series, outlining effective policies and practices for combating insider cyber security threats to the modern enterprise.
Insider cyber security threats are much more prevalent than most of us realize. IBM estimates that 60 percent of all cyberattacks are perpetrated by those with...