worker portraits on a shield, illustration - Credit: Peter Crowther Associates, Shutterstock

Implementing Insider Defenses

Classical approaches to cyber-security—isolation, monitoring, and the like—are a good starting point for defending against attacks, regardless of perpetrator. But implementations of those approaches in hardware and/or software can invariably be circumvented by insiders, individuals who abuse privileges and access their trusted status affords.

Read More
The Dark Triad, illustration - Credit: Alicia Kubista / Andrij Borys Associates

The Dark Triad and Insider Threats in Cyber Security

In this article, we focus on a set of pathological personality traits known as the dark triad. Evidence from recent insider threat cases leads us to believe these traits may correlate with intentions to engage in malicious behavior.23 After discussing insider threats and the dark triad traits, we present results from an empirical study that illustrate the relationship between the dark triad traits and malicious intent. We then discuss the importance of these results and make recommendations for security managers and practitioners based on our findings.

Read More

Getting Hooked on Tech

Communications of the ACM, June 2018, Vol. 61 No. 6, Pages 18-19
By Logan Kugler

“Facebook and Google lead the way in this arena. Facebook allows users to customize their personal profile to their liking and indicate their interests by engaging with content. Every reaction a user has to a post teaches Facebook’s algorithms his/her preferences; these algorithms then serve more content that even better matches the user’s preferences.

The result? The user visits and revisits the site, staying for longer, making them a richer target for advertising.”

Read More