ChaptersEventsBlog
Card testing is hitting revenue, not just fraud. What should payment companies do now? Register for this March 10 webinar →

Defeating Insider Threats

Released: 10/19/2016

Defeating Insider Threats
Defeating Insider Threats
As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the following:


Employees leaking critical information and tradecraft on illicit sites
Data types and formats being exfiltrated along with exfiltration mechanisms
Why so many data threats go undetected
What happens to the data after it has been exfiltrated
Tools to disrupt and prevent the data exfiltration cycle
Possibilities to expunge traces of data once exfiltrated

Download this Resource

Prefer to access this resource without an account? Download it now.

Featured by CSA

Want to see your content featured here?

Contact us to learn more!

Explore More of CSA

Research & Best Practices

Stay informed about the latest best practices, reports, and solutions in cloud security with CSA research.

Upcoming Events & Conferences

Stay connected with the cloud security community by attending local events, workshops, and global CSA conferences. Engage with industry leaders, gain new insights, and build valuable professional relationships—both virtually and in person.

Training & Certificates

Join the countless professionals who have selected CSA for their training and certification needs.

Industry News

Stay informed with the latest in cloud security news - visit our blog to keep your competitive edge sharp.