Cyber Insider Threat

Results: 31



#Item
1Opinion  Managing Insider Threats Is a Key Component to Cyber Security June 13, 2016 Most directors recognize the growing importance of cyber security,

Opinion Managing Insider Threats Is a Key Component to Cyber Security June 13, 2016 Most directors recognize the growing importance of cyber security,

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2016-06-13 10:31:11
2www.balabit.com  Why do companies need User Behavior Analytics?

www.balabit.com Why do companies need User Behavior Analytics? "Only amateurs attack machines; professionals target people. And any solutions will have to target the people problem, not the math problem."1

Add to Reading List

Source URL: pages.balabit.com

Language: English - Date: 2016-08-13 13:21:12
3JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-03-28 12:39:15
4Guest Editors’ Introduction  Addressing the Insider Threat A

Guest Editors’ Introduction Addressing the Insider Threat A

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
5WHITE PAPER  Securing the Modern Enterprise “Factory:” How to Build an Insider Threat Program.  This whitepaper explores the kinds of internal users who are most

WHITE PAPER Securing the Modern Enterprise “Factory:” How to Build an Insider Threat Program. This whitepaper explores the kinds of internal users who are most

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-07-20 11:10:08
6Threats and vulnerabilities in cyber security – addressing the insider threat SAMI Seaworthiness & Cyber Security, HQS Wellington, July 23rd 2014 Professor Sadie Creese

Threats and vulnerabilities in cyber security – addressing the insider threat SAMI Seaworthiness & Cyber Security, HQS Wellington, July 23rd 2014 Professor Sadie Creese

Add to Reading List

Source URL: www.seasecurity.org

Language: English - Date: 2014-07-24 03:54:26
    7Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

    Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

    Add to Reading List

    Source URL: www.raytheoncyber.com

    Language: English - Date: 2015-04-19 23:42:34
    8Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

    Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

    Add to Reading List

    Source URL: www.raytheoncyber.com

    Language: English - Date: 2015-04-19 07:38:51
    9A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches Jason R.C. Nurse1 , Philip A. Legg1 , Oliver Buckley1 , Ioannis Agrafiotis1 , Gordon Wright2 , Monica

    A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches Jason R.C. Nurse1 , Philip A. Legg1 , Oliver Buckley1 , Ioannis Agrafiotis1 , Gordon Wright2 , Monica

    Add to Reading List

    Source URL: www.cs.ox.ac.uk

    Language: English - Date: 2014-07-17 08:03:36
    10Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute

    Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute

    Add to Reading List

    Source URL: www.cs.ox.ac.uk

    Language: English - Date: 2015-03-18 10:54:09