When it comes to the malicious insider threat, the risk may be larger if the perpetrator is an IT person, or someone with advanced IT knowledge. If so, that individual may have both credentials, and the skills and know how to cover their tracks in order to avoid detection. This might mean tampering with loggingThe post Deter Insider Threats With Immutable Logging appeared first on Trustifier Webworld.