contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Misuse of database information by insiders
Tuesday, 19 April 2005, 09:36 GMT

In the security world, we are constantly worried about the people getting in from the outside. The thought of hackers poking around and stealing information keeps all of us up at night. It's why we read books and articles, buy new products, and install the latest and greatest software.

And every security pro worth their salt remembers to address the insider threat. But I think too often we only consider the "big" risks. The salesman duplicating a client contact list before resigning, the engineer copying a crucial algorithm before switching jobs, the customer service rep writing down credit card numbers.

Read More at SecurityFocus

Back to main page


SecurityWatch - 24x7 advisory and vulnerability automated monitoring service.

GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

InfoSec Directory
» Smart-Phone Attacks and Defenses
» Preventing Spyware Infestation
» Preliminary study: Bluetooth Security
» An initiative extending SMTP to include email sender identity and reputation
» Identity Assurance in a Virtual World
Latest Press Releases
» Kavado Announces Defiance Risk Management System (RMS) to Support Compliance Reporting for Web Applications Security
» The Middleburgh Telephone Company Chooses Motorola’s Multi-Service Access Platform to Deliver Next Generation Triple-Play Services
» Keynesis Ltd. Announces the Release of Lockngo Professional Version 3.0
» net.com Customises SHOUT Family to Deliver VoIP Migration Appliance (VMA)
» Free Vulnerability Scan Now Available for SANS Top 20 Quarterly Update
» WiFi Manager Integrates Support For DLINK, SMC, LINKSYS and Nomadix Wireless devic
More Articles
» Understanding Rich Internet Applications
» Voice and Data Convergence - a Vendor’s Perspective
» Making Firewall Do the Work: Stateful Packet Inspection
» Four Things You Must Know Before Deploying Wireless LANs
» Put spyware on the security map
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter