Welcome to the security world, where agencies worry about cyber attacks from the outside as much as from the inside. Guest blogger Ed Bender highlights some surprising results from a recent survey in which respondents lament the insider threat; both from those who intend harm and those who inadvertently invite it.
You can reduce the probability of a cyber attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and making a commitment to spending more time with your employees/members of your command.
With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
Science Applications International Corporation, McLean, Virginia, was recently awarded an approximate $9 million contract for research in the detection of insider threats based on sensor data from routine activities of members of a group, and possibly social networks. The U.S. Army Contracting Command, Durham, North Carolina, is the contracting activity.