Feds Call on Contractors to Play Ball in Mitigating Insider Threats

Image result for Apple iOS Threats Fewer Than Android But More Deadly

Anyone who has ever played a team sport understands the importance of two key tenets when it comes to winning: practice makes perfect, and your team is only as strong as its weakest player. The same can be said as they relate to mitigating the insider threat, one of the most pressing IT security and risk management challenges we face today.

Time and time again, we’ve seen attackers leverage compromise of authorized access to networks, most often granted to third-party contractors, to bypass otherwise effective security defenses. In other cases, unchecked activity on the part of those contractors with access has resulted in cataclysmic security incidents.

Read more

Leave a Comment

Your email address will not be published. Required fields are marked *