insider threat

March 4, 2015
By Glenn Kesselman

You can reduce the probability of a cyber attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and making a commitment to spending more time with your employees/members of your command.

January 28, 2015
By Ed Bender
In this file photo, Marines develop their private cloud, focusing on ensuring the right access for the right people.

With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.

June 22, 2011
By George Seffers

Science Applications International Corporation, McLean, Virginia, was recently awarded an approximate $9 million contract for research in the detection of insider threats based on sensor data from routine activities of members of a group, and possibly social networks. The U.S. Army Contracting Command, Durham, North Carolina, is the contracting activity.