30-something men most likely to steal company secrets

clock

New research used to create a profile of the typical insider IP thief

The typical profile of an insider likely to be a threat to an organisation's intellectual property is 37 years old, male and probably a programmer, engineer or manager. That's according to new r...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Case study: How Waverton became a cloud-first asset manager

Cloud Computing

Close ties with a vendor partner eased the process

clock 05 October 2023 • 4 min read
Bluebottle hackers target financial institutions using Microsoft-signed driver

Threats and Risks

Attackers targeting banks in French-speaking countries using live-off-the-land and off-the-shelf tools have many similarities with the OPERA1ER group, say researchers

clock 06 January 2023 • 2 min read
China state-backed threat actor compromises digital certificate authority

Threats and Risks

Such breaches might provide attackers the ability to publish valid code-signing certificates, which could then be used to sign malware

clock 16 November 2022 • 3 min read

More on Threats and Risks

Proportion paying ransoms declines in Q1 2024, even as takings break a new record

Proportion paying ransoms declines in Q1 2024, even as takings break a new record

Only 28% willing to meet ransomware gangs' demands

Muskan Arora
clock 23 April 2024 • 2 min read
ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat restrict access to compromised systems while they steal valuable data.

Muskan Arora
clock 23 April 2024 • 2 min read
Hackers launch brute-force attacks on business VPNs and more

Hackers launch brute-force attacks on business VPNs and more

The attacks rely on trial-and-error attempts to crack login credentials

clock 18 April 2024 • 2 min read