http://www.itsecurityguru.org/2015/03/17/spotting-the-threat-within/
http://www.itsecurityguru.org/2015/03/16/attacking-from-the-outside/