Inside the Briefcase

FICO Scales with Oracle Cloud

FICO Scales with Oracle Cloud

Doug Clare, Vice President at FICO, describes how Oracle...

Is Your Enterprise IT the Best It Can Be?

Is Your Enterprise IT the Best It Can Be?

Enterprise IT is a driver of the global economy....

The IoT Imperative for Consumer Industries

The IoT Imperative for Consumer Industries

This IDC white paper examines current and future...

How to align your visual brand guidelines and create consistently on-brand content

How to align your visual brand guidelines and create consistently on-brand content

In this ebook, we’ll explore the various themes leading...

Your B2B Content Strategy in 2017: How To Think Like A Movie Studio + 6 Other Tactics

Your B2B Content Strategy in 2017: How To Think Like A Movie Studio + 6 Other Tactics

Jon Lombardo, Creative Lead, LinkedIn, reveals in this presentation...

IT Security & Network Security News & Reviews: Insider Security Threats: 10 Tactics to Stop These Data Breaches

March 5, 2012 No Comments

SOURCE:  eWeek

The full version of 2012 Verizon Data Breach Investigation Report is being released soon. However, the report’s preliminary findings show that a vast majority of data breaches in 2011 were the result of outsiders trying to break in for malicious purposes. With those kinds of numbers, it is very easy to forget that insider attacks are often as equally devastating as, if not more devastating than, external threats. Insider attacks are very common and can happen to anyone, Dawn Cappelli, technical manager from Carnegie Mellon University’s CERT Insider Threat Center, told attendees at the 2012 RSA Conference in San Francisco.

Read More

Featured Articles, SECURITY

Leave a Reply

(required)

(required)


ADVERTISEMENT

IBC 2017

ITBriefcase Comparison Report