You can reduce the probability of a cyber attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and making a commitment to spending more time with your employees/members of your command.
With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
Science Applications International Corporation, McLean, Virginia, was recently awarded an approximate $9 million contract for research in the detection of insider threats based on sensor data from routine activities of members of a group, and possibly social networks. The U.S. Army Contracting Command, Durham, North Carolina, is the contracting activity.