Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > CA Technologies > Dealing with Insider Threats to Cyber-Security
 

Dealing with Insider Threats to Cyber-Security

White Paper Published By: CA Technologies
CA Technologies
Published:  Jan 09, 2015
Type:  White Paper
Length:  13 pages

While many organizations focus their security efforts on their network border, it is the insider that perhaps poses the most risk to cyber-security. From executives to IT administrators to partners, many people have access to sensitive data that if publicly exposed, could have significant ramifications to an organization’s business—or even its existence.

Download this paper to find out about the technology available to help reduce the risk and enable information sharing within an organization.



Tags : 
insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security