Essential Guide

Formulating and managing online identity and access control

A comprehensive collection of articles, videos and more, hand-picked by our editors

Enterprises fear insiders, but lack privileged user controls

A new survey finds that, despite the huge looming threat of malicious insiders, many enterprises fail to implement proper privileged user controls.

Prompted by the intense news coverage surrounding former NSA contractor Edward Snowden and the WikiLeaks website,...

enterprises are as concerned as ever about the threat of insiders leaking sensitive information. Despite that concern, newly released survey results indicate that many organizations lack fundamental controls for limiting and monitoring the activity of privileged users, a key step in mitigating the insider threat.

For its newly released report, "Privileged User Abuse and the Insider Threat," the Ponemon Institute surveyed nearly 700 users with in-depth knowledge of how their respective organizations manage privileged users. Out of those respondents, 88% signaled that they expect the risk stemming from privileged users to stay the same or grow in the coming years.

PRO+

Content

Find more PRO+ content and other member only offers, here.

Essential Guide

Formulating and managing online identity and access control
Related Discussions

Brandan Blevins asks:

What steps has your organization taken to monitor and control the activities of privileged users?

1  Response So Far

Join the Discussion

2 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close