{"id":25423,"date":"2014-08-11T01:41:23","date_gmt":"2014-08-11T05:41:23","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25423"},"modified":"2014-08-11T01:41:23","modified_gmt":"2014-08-11T05:41:23","slug":"snowden-leaks-prompt-firms-to-focus-cyber-security-on-insider-threats","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/snowden-leaks-prompt-firms-to-focus-cyber-security-on-insider-threats.php","title":{"rendered":"Snowden leaks prompt firms to focus cyber security on insider threats"},"content":{"rendered":"<p><p>    At this weeks Def Con hacker gathering in Las Vegas, Tess    Schrodinger sounded almost annoyed.  <\/p>\n<p>    The whole insider-threat phenomenon, they act like its this    new thing, the cyber security expert told the crowd.  <\/p>\n<p>    Schrodinger then spent an hour ticking off a long string of    insider threats long before Edward Snowden's famous leaks, from    Guy Fawkes, who tried to blow up Britain's House of Lords, to    Brian Patrick Regan, an American Air Force sergeant convicted    of trying to sell secrets to Saddam Hussein.  <\/p>\n<p>    Suddenly we have to worry about this, Schrodinger told the    Def Con crowd, even citing Judas to make her case. If you know    your history, insider threat has been an issue before the    beginning of time.  <\/p>\n<p>    But even if insider threats can be traced back to the biblical    era, the recent focus on them has had an impact on the business    of cybersecurity. Pre-Snowden, much of the attention was    devoted to protecting against cybercriminals and foreign    hackers. Now companies are increasingly protecting themselves    from their own employees. Cracking down too hard can stifle    workplace creativity, but potentially losing millions from a    single breach of intellectual property can be even more    worrisome.  <\/p>\n<p>    After private companies witnessed the damage a contractor in    Hawaii could inflict on the nation's largest spy agency,    theyre lining up to avoid a similar fate. And firms that    specialize in protecting corporate data say thats been a boon.  <\/p>\n<p>    Verizons 2014 threat report, which chronicles breaches in the    last year, noted an uptick in internal espionage incidents, not    because more necessarily occurred but because an emphasis on    insider-focused security resulted in more getting detected.  <\/p>\n<p>    The Snowden news, the report said, illustrates the risk that    exists when an organization must place trust in    individuals...Most insider misuse occurs within the boundaries    of trust necessary to perform normal duties. Thats what makes    it so difficult to    prevent.  <\/p>\n<p>    Even the former second-in-command at the National Security    Agency has benefited.  <\/p>\n<p>    Chris Inglis, who helps corporations guard against threats as    an advisor for data security firm Securonix, said in an    interview with The Times that the Snowden leaks have been good    for business.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.latimes.com\/la-fi-tn-insider-threat-def-con-corporate-cybersecurity-20140810-story.html?track=rss\/RK=0\/RS=aSBPpqVbCOEpDHEnejyJWvXJbLA-\" title=\"Snowden leaks prompt firms to focus cyber security on insider threats\">Snowden leaks prompt firms to focus cyber security on insider threats<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> At this weeks Def Con hacker gathering in Las Vegas, Tess Schrodinger sounded almost annoyed. The whole insider-threat phenomenon, they act like its this new thing, the cyber security expert told the crowd<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-25423","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25423"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25423"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25423\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}