By David Pogemiller, VP Strategy   The most common approach that insider threat teams use to discover bad actors is through an event-based analysis. This involves looking at streams of activity — captured via windows logs, proxy, endpoint agents, financial data, etc — and making an assessment of how risky that activity is. This is […]