Snowden Want-a-be Nabbed by FBI
Posted by: Timothy Weaver on 10/06/2016 11:35 AM
[
Comments
]
The FBI nabbed 51-year-old Harold T. Martin III, who worked at the same firm as Edward Snowden, was arrested after the FBI raided his home and car.
Martin was suspected of stealing classified documents related to the hacking into foreign government networks. The raid found an abundance of highly classified documents, which Martin was not authorized to have.
Martin was arrested and said “he knew what he had done was wrong and that he should not have done it because he knew it was unauthorized.”
“Insider threat is the most realistic and largest threat to corporate data. No intrusion detection or perimeter security measure can account for this,” said Mark Wilson, director of product development for STEALTHbits Technologies. “An internal bad actor with motivation and the correct credentials can and will infiltrate an organization's Crown Jewels - sensitive data. Why? Because it has monetary value.”
“The challenge is how to minimize the attack surface, alert to a breach, and preferably, stop the activity before it can occur,” he said. “This can only be achieved by understanding what the insider threat is and their motivation, by applying suitable measures to alert to and stop the activity in the first place.”
Authorities still do not know what Martin had planned for the data.
“More often than not, the insider attack is only realized long after the event as borne out by the fact this breach occurred two years ago,” said Julien Bellanger, co-founder and CEO of Prevoty. “No level of security clearance can account for privilege and motivation. Therefore the only way to address this is to consider least level of access best practices for privileged credentials and minimizing permissive and accessible access to data.”
Source: SCMagazine
Martin was arrested and said “he knew what he had done was wrong and that he should not have done it because he knew it was unauthorized.”
“Insider threat is the most realistic and largest threat to corporate data. No intrusion detection or perimeter security measure can account for this,” said Mark Wilson, director of product development for STEALTHbits Technologies. “An internal bad actor with motivation and the correct credentials can and will infiltrate an organization's Crown Jewels - sensitive data. Why? Because it has monetary value.”
“The challenge is how to minimize the attack surface, alert to a breach, and preferably, stop the activity before it can occur,” he said. “This can only be achieved by understanding what the insider threat is and their motivation, by applying suitable measures to alert to and stop the activity in the first place.”
Authorities still do not know what Martin had planned for the data.
“More often than not, the insider attack is only realized long after the event as borne out by the fact this breach occurred two years ago,” said Julien Bellanger, co-founder and CEO of Prevoty. “No level of security clearance can account for privilege and motivation. Therefore the only way to address this is to consider least level of access best practices for privileged credentials and minimizing permissive and accessible access to data.”
Source: SCMagazine
Comments