"You need to educate people, and you need to have the right control procedures in place to ensure that people are aware of insider fraud," says Larry Ponemon, offering tips to reduce insider risks.
In an interview about the insider threat, Ponemon discusses:
Key findings from this new research;
What needs to be...
Post-breach, organizations must have a full grasp on what happened - and convey that message consistently. Too often, that's not the case, says attorney Ronald Raether. What steps must organizations take?
A new IBM study identifies three distinct types of information security leaders: Influencers, Protectors and Responders. Which type are you? IBM's Marc van Zadelhoff offers tips for more effective leadership.