The incidents with Chelsea Manning and Edward Snowden have revealed just how damaging an insider can be in obtaining and making public highly sensitive information. Data leakage is but one possible consequence resulting from the efforts of these individuals. There is no easy, one-stop shop solution to combat insider threats, layered approaches often provide the best way forward. Technology that monitors user behavior and analytics can also help proactively identify this threat before it escalates to a serious issue. Technology that monitor remote access from all endpoints are important as they provide a comprehensive view of the organizations enterprise.”]
Source: https://www.csoonline.com/article/3089857/mitigating-insider-threats-a-technical-perspective.html