RSS feed Get our RSS feed

News by Topic

Stopping the Attackers You Trust: A deception-based approach to insider threats

Illusive Networks

Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.

Tags : emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management
 Email this page
Published:  Apr 10, 2019
Length:  10
Type:  White Paper