Find out how analytics, from data mining to cognitive computing, is changing the way we do business
![The enemy within: When trusted access turns into insider threat](https://blogs.sas.com/content/statelocalgov/files/2017/01/FraudSecurity-1.png)
Not all fraud originates from the dark underground of criminal enterprises. In fact, fraud could literally be right under our noses, or in the cubicle next to us. The “Insider Threat” has many names – internal fraud, occupational fraud, even espionage – and uses authorized internal access and knowledge to