2021 IBM Security X-Force Insider Threat Report
Top discovery methods and recommendations for insider attacks


Provided by
Organisations often focus on thwarting cyber attacks that come from outside of the company, overlooking insider threats that come from within their organisation.
The 2021 IBM Security X-Force Insider Threat Report allows you to define and combat insider threats.
This paper will examine critical discoveries from that data, including:
- How most insider attacks are discovered
- The role access level plays in insider attacks
- Best practices for mitigating insider threats
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
What is polymorphic malware?
Explainer Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses
-
Outgoing Kaseya CEO teases "this is just the beginning" for the company
Opinion We spoke to Fred Voccola who remains a key figurehead at the firm as it enters its next chapter...
-
The rise of identity-based cyber attacks and how to mitigate them
In-depth If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network
-
2022 Public Sector Identity Index Report
Whitepaper UK Report
-
Modernising identity for a secure, agile hybrid workforce
Whitepaper Pave the way towards a modern, secure, efficient, and sustainable hybrid workplac
-
Business customer identity for SaaS apps - simplified
Whitepaper Accelerate business growth with a scalable enterprise identity solution purpose-built for SaaS apps
-
A comprehensive guide for your Customer Identity Maturity journey
Whitepaper A flexible approach to help any company advance its identity posture
-
The Okta hybrid work report 2023
Whitepaper How European leaders are building long-term strategies for hybrid working
-
Anatomy of identity-based attacks
Whitepaper Helping security teams mitigate identity-based attacks
-
SolarWinds hackers strike again with a new “MagicWeb” authentication exploit
News Microsoft warns MagicWeb can abuse admin credentials to hijack AD FS enterprise identity system