Alleviating Insider Threats: Mitigation Strategies and Detection Techniques