It is important to understand that there are various types of insider threats and that each one requires a different approach from an information security standpoint.
While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.
The need for cyber threat intelligence sharing is still vital, and with Congress sidelined, it's going to take leadership from the nation's corporate executives to make progress on this issue within the framework of our current laws.
As the Edward Snowden affair continues to make headlines around the world, there are ways organizations can bolster their security strategy to ensure they're not the next target.
It's true: There are certain attacks that no security technology will be able to stop. But the situation isn't entirely hopeless. How organizations respond to an active threat can make all the difference in the world.
Considering the endless march of breaches, it may be time to scrap the belief that adequate passwords -- or even passphrases -- can prevent hackers from breaking into corporate environments. Instead, security pros should focus their efforts on gaining visibility into their networks.