insider threat

(Photo courtesy of NIST)An employee swipes their personal identity verification (PIV) card

DIA’s cyber assessments, including insider threat defenses, key to modernizing top-secret network

DIA is doing proactive inspections to make sure agencies are following cyber standards for securing the top-secret JWICS network.

Read more
FILE - In this Sept. 19, 2013 file photo, military personnel walks past an entrance to the Washington Navy Yard in Washington. Two years after the shooting at the Washington Navy Yard, families whose loved ones died are filing multimillion dollar lawsuits against companies they say could have prevented it from happening.  (AP Photo/Charles Dharapak, File)

One decade after Navy Yard shooting, major changes made to ‘insider threat’ approach

Read more
Getty Images/Ryan McVay/Federal News Networksecurity clearance, access, badge, worker

Agencies are on the hook to increase ‘operations security’ training, education

Read more
Getty Images/iStockphoto/LeoWolfertCorporate security manager identifies a potential insider threat in a line-up of eight white collar workers. Hacker or spy icon lights up purple. Cybersecurity and human resources challenge concept.

Insider threat initiative highlights ‘workplace culture’ on program’s 10-year anniversary

Read more
Spyware virus software, bizzare spooky hooded hacker with magnifying glass analyzing computer hexadecimal code, stealing online identity, breaking into personal web accounts.

Industry urges ramp-up of insider threat info sharing with security clearance changes on the way

Read more
Getty Images/iStockphoto/anyaberkutsecurity clearance

Enrolling more security clearance holders in continuous evaluation could save billions

Read more
security clearance, insider threat

Agencies made ‘significant progress’ on insider threat, but space is constantly evolving, ODNI says

As the insider threat space constantly evolves, the Office of the Director of National Intelligence has a new framework designed to withstand the ever-changing…

Read more

2-factor authentication is coming for TSP participants, agency says

Thrift Savings Plan participants have been asking if the Federal Retirement Thrift Investment Board will ever add two-factor authentication to their online…

Read more
Reality Winner arrives at a courthouse in Augusta, Ga., Thursday, Aug. 23, 2018, after she pleaded guilty in June to copying a classified U.S. report and mailing it to an unidentified news organization. (Michael Holahan/The Augusta Chronicle via AP)

Another winner ended up losing

Would continuous background monitoring have stopped a Reality Winner from accessing, let alone leaking, secret documents?

Read more