ContentTraining to nullify the insider threatAngus MacDonaldDecember 7, 2006In the last decade, the security of your information on your networks has been focused on protecting the integrity of data from outsiders. Much of the effort has been based on perimeter security - from outsiders trying to break into the network.