Technical Barriers to Monitoring, Detecting, and Investigating Insider Fraud

Examines the limitations of common security controls when it comes to controlling insider abuse, with special attention to the types of abuse that can occur when insiders have legitimate access to enterprise information systems.

Sponsor: Attachmate Luminet