The SEI has also conducted research on insider threats and computer forensics.
The researchers have undertaken a systematic analysis of insider threat, one that addresses technical challenges but also takes into account ethical, legal and economic dimensions.
Unfortunately, encryption does not protect against account hijacking or insider threats, which are among the most prevalent means of compromising personal data.
And the theme of this third one is insider threats in systems now.
And social engineering, of course, a slightly weaker form of the same thing as an insider threat, but also extremely hard to defend against.
More dangerous still is what Joanna Crane calls the insider threat - when an actual employee does the dirty work.
After leaving @stake in 2002 he disappeared from the information security scene before resurfacing as a technical advisor to "insider threat" company Intrusic.
Misuse detection actively works against potential insider threats to vulnerable company data.
There is a high correlation therefore between Database Security and the need to protect from the insider threat.
Reluctant compliance is never enough; buy-in is critical or companies will have no effective way to deal with insider threat.