Can the bad guys’ insider recruitment methods be reverse-engineered to reveal potential insider threats? Let’s take a look. Source