August 31, 2009 by Michael Peters Bookmark In the debate concerning insid… In the debate concerning insider versus outsider information security threats, consider any connection to data as an outsider threat. Share this:PrintLinkedInTwitter