insider threat

  • From Google searches to LinkedIn connections, a wealth of publicly available online information can reveal a person's mindset, and possibly tip off the government to the next Edward Snowden or Aaron Alexis. The intelligence community has done some testing, but a final policy remains elusive. Contractors are hesitant.

    October 16, 2014
  • Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.

    August 05, 2014
  • It's hard to tell how many agencies are actually checking all the boxes on the Obama administration's plan for detecting disgruntled or rogue employees. Agencies were supposed to have taken initial steps to set up insider threat programs by June 30, according to an update posted on Performance.gov. But it's impossible to know the number of agencies who met the initial criteria so far. The progress update says that information is classified.

    July 18, 2014
  • NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.

    May 21, 2014
  • Everyday behavior of your coworkers could be a sign of a looming insider attack. A new report explains what to watch out for and how agencies can try and predict the next threat.

    April 28, 2014
  • The government is on high alert for insider threats. From shootings on military base to cybersecurity leaks, it may seem like your officemate could turn into your agency's worst nightmare. Agencies struggle with appropriate ways to migrate threats. Mike Gelles, a former chief psychologist for the Naval Criminal Investigative Service and now with Deloitte, talked about the threats with Federal Drive hosts Tom Temin and Emily Kopp.

    April 25, 2014
  • Through the back-end attribute exchange, agencies can have a standard way for different organizations to safely and securely share sensitive information. The Justice Department conducted a pilot earlier this year and found success with state and local law enforcement agencies accessing the Regional Information Sharing System.

    November 29, 2013
  • The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.

    April 05, 2012
  • Immigration and Customs Enforcement received a score of 95 on its FISMA report card in 2011. Jeff Eisensmith, the ICE CISO, said the agency is implementing continuous monitoring and increasing the training of its employees.

    October 19, 2011