Latest Additions to the Library
Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments
This technical note explores the applicability of application virtualization as a strategy for cyber foraging in resource-constrained environments. Cyber foraging is a technique to enable resource-poor, mobile devices to leverage...
This report presents methods to audit USB device use within a Microsoft Windows environment.
Insider Fraud in Financial Services
This brochure presents a summary of the findings of a recent study that analyzed insider and outsider computer criminal activity in the financial services sector to help security professionals prevent,...
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
This report describes a new insider threat study in which researchers extracted technical and behavioral patterns from fraud cases and developed insights and risk indicators of malicious insider activity within...
Spotlight On: Malicious Insiders and Organized Crime Activity
This report defines malicious insiders and organized crime and provides a snapshot of who malicious insiders are, what and how they strike, and why.