Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart risky employees? Cheh et al. offer some insights for identifying malicious insiders based on recorded physical access logs.
展开▼