30-something men most likely to steal company secrets

clock

New research used to create a profile of the typical insider IP thief

The typical profile of an insider likely to be a threat to an organisation's intellectual property is 37 years old, male and probably a programmer, engineer or manager. That's according to new r...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
CISA confirms Windows privilege escalation flaw has been exploited

Threats and Risks

US cybersecurity agency also added a recently disclosed Google Pixel flaw to its list of exploited vulnerabilities

clock 17 June 2024 • 1 min read
Case study: How Waverton became a cloud-first asset manager

Cloud Computing

Close ties with a vendor partner eased the process

clock 05 October 2023 • 4 min read
Bluebottle hackers target financial institutions using Microsoft-signed driver

Threats and Risks

Attackers targeting banks in French-speaking countries using live-off-the-land and off-the-shelf tools have many similarities with the OPERA1ER group, say researchers

clock 06 January 2023 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

CISA confirms Windows privilege escalation flaw has been exploited

CISA confirms Windows privilege escalation flaw has been exploited

US cybersecurity agency also added a recently disclosed Google Pixel flaw to its list of exploited vulnerabilities

Kyle Alspach
clock 17 June 2024 • 1 min read
Windows users warned of wireless takeover vulnerability

Windows users warned of wireless takeover vulnerability

Users are advised to update immediately

Penny Horwood
clock 17 June 2024 • 2 min read
Threat group 'systematically compromising Snowflake customer instances'

Threat group 'systematically compromising Snowflake customer instances'

165 organisations notified to date

Kyle Alspach
clock 11 June 2024 • 2 min read