Publications
4thGen SME Articles and Papers
MIROR Journal, West Point Press
Common Insider Characteristics

Identifying common personality characteristics, precipitating events, and indicators for insider types.

View/Download

MIROR Journal, West Point Press
Red Flags Reimagined

A CIA Operations Officer on Today’s Insider Risk Challenge

Security Clearance Jobs
Insiders 101: Common Characteristics of Increasingly Common Actors

Insiders. How we can define their personalities, critical events, potential indicators, and attack progression.

ASIS Security Management Cover Article
Remote Work and Insider Threat

New perspectives, policies and perspectives needed.

View / Download

ASIS Security Management Cover Article
The Attacker Mentality

Malicious actors think and act differently. So should you.

View / Download

ASIS Security Management Cover Article
The Next ESRM Revolution

Used properly, advanced technology empowers next generation risk management.

View / Download

Cipher Brief
Fourth Generation Espionage

Ubiquitous digital surveillance and powerful data analytics are changing espionage in ways that we’re only starting to understand.

View / Download

Clearance Jobs INSA Opinion-Editorial
Jack Teixeira: Anomaly or Archetype?

Emotions, finances, and politics have long been traditional motivators for malicious insiders.

View / Download

ASIS Security Management Interview
In the Wake of Mass Layoffs, Insider Threats Multiply

Layoffs and terminations are often a trigger for negative actions.

View / Download

Clearance Jobs/INSA Opinion-Editorial
Major Data Thefts Enable Adversaries to Target Americans

Data breaches help foreign adversaries recruit insider sources from government agencies, businesses, and universities.

View / Download

INSA Paper
Managing Insider Risk During Mergers and Acquisitions

Corporate mergers and acquisitions (M&A) create significant security risks and vulnerabilities for both the buyer and seller.

View / Download

INSA Paper
Mitigating Advanced Persistent Insider Threats Fueled by Major Data Breaches

Large-scale thefts of personal data threaten American government agencies and private companies that hold sensitive information of value to hostile nations.

View / Download

ASIS e-Book Chapter
Using Public Data to Counter Insider Risk

Indicators of insider risk are increasingly reflected in publicly available spaces.

View / Download

SECURITY CLEARANCE JOBS
Rethinking "Red Flags"

A Whole Threat and Whole Person Approach to Effective Insider Threat Warning

View / Download

Contact Us: info@4thgen.com