2021 IBM Security X-Force Insider Threat Report
Top discovery methods and recommendations for insider attacks
Provided by
Organisations often focus on thwarting cyber attacks that come from outside of the company, overlooking insider threats that come from within their organisation.
The 2021 IBM Security X-Force Insider Threat Report allows you to define and combat insider threats.
This paper will examine critical discoveries from that data, including:
- How most insider attacks are discovered
- The role access level plays in insider attacks
- Best practices for mitigating insider threats
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
The rise of identity-based cyber attacks and how to mitigate themIn-depth If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network
-
2022 Public Sector Identity Index ReportWhitepaper UK Report
-
Modernising identity for a secure, agile hybrid workforceWhitepaper Pave the way towards a modern, secure, efficient, and sustainable hybrid workplac
-
Business customer identity for SaaS apps - simplifiedWhitepaper Accelerate business growth with a scalable enterprise identity solution purpose-built for SaaS apps
-
A comprehensive guide for your Customer Identity Maturity journeyWhitepaper A flexible approach to help any company advance its identity posture
-
The Okta hybrid work report 2023Whitepaper How European leaders are building long-term strategies for hybrid working
-
Anatomy of identity-based attacksWhitepaper Helping security teams mitigate identity-based attacks
-
SolarWinds hackers strike again with a new “MagicWeb” authentication exploitNews Microsoft warns MagicWeb can abuse admin credentials to hijack AD FS enterprise identity system


