News & Insights

Data Harvesting and the Grazing Threat You're Probably Missing
Data harvesting is when people—usually insiders—gradually collect sensitive data without authorization, whether they plan to misuse it or just don't realize they're crossing a line. The "data grazing" analogy really captures what makes this so sneaky: it's like cattle slowly eating their way through a field.

When Your Biggest Threat Wears a Company Badge: What Apple's Latest Lawsuit Teaches Us About Insider Risk
Picture this: You're Apple, one of the most security-conscious companies on the planet. You've got cutting-edge tech, massive security budgets, and some of the brightest minds in the industry. Yet in June 2025, you find yourself filing a lawsuit against a former senior hardware engineer who allegedly walked away with thousands of confidential files about your Vision Pro headset.

The Slow-Motion Heist: When Good Employees Go Bad (And Nobody Notices)
The most dangerous insider threats don't announce themselves with dramatic gestures or obvious red flags. They whisper rather than shout, operating in the gray spaces between legitimate access and malicious intent.

The Industry Migration Pattern: Why Scattered Spider's Move to Aviation Signals Danger for Every Sector
Scattered Spider's evolution reveals a troubling progression from hospitality and entertainment (MGM Resorts, Caesars Entertainment) to retail (Marks & Spencer) to Silicon Valley technology companies. Now they're targeting aviation with the same proven methodology. How do you prepare for the next move?

The Hidden Threat of Shadow AI: What You Can't See Will Hurt You
This isn't theoretical—it's happening right now. A marketing manager pastes customer feedback into ChatGPT to generate campaign ideas. An HR representative uploads resumes to an AI tool for initial screening. A finance analyst shares budget data with an AI assistant to create forecasts.

ISO 27001:2022’s New DLP Requirement – Is Your Organization Ready?
In October 2022, ISO published a major update to the 27001 standard. Among the key changes was a new control requirement under section 8.1, focused entirely on Data Leakage Prevention.This control requires organizations to implement data leakage prevention measures across all systems, networks, and devices that process, store, or transmit sensitive data.

He Was Paid to Catch Insider Threats. Instead, He Became One
Laatsch wasn't some disgruntled contractor or overlooked temp worker. He was a 28-year-old IT specialist with the Defense Intelligence Agency, holding Top Secret clearance and working within the very division designed to prevent exactly what he was attempting: the Insider Threat Division.

Coinbase Data Breach 2025: Insider Threat Attack Exposes Need for Real-Time Endpoint Security and DLP Solutions
The recent Coinbase data breach 2025 has sent shockwaves through the cybersecurity community. Extortionists successfully targeted and coerced Coinbase employees to access sensitive customer information, demonstrating how insider threats and data loss prevention (DLP) failures remain among the most damaging cybersecurity vulnerabilities in financial services.

Why Industry Recognition Matters: What Our 2025 "Hot Company" Award Says About the Future of Cybersecurity
The cybersecurity industry is finally catching up to what we've known all along—the most dangerous threats don't come from outside your walls. They come from the people you trust most.

The Hidden Data Breach: 3 Ways Your Office Printers Are Exposing Sensitive Information
In today's complex threat landscape, comprehensive security means eliminating blind spots. Your multi-function printers represent a critical gap in traditional security architectures—one that insider threats are increasingly exploiting.

The Office Security Threat You're Probably Ignoring: Your Printers
That printer sitting in your office corner? It might just be your biggest security blind spot. While your IT team fortifies digital defenses with fancy endpoint protection and network monitoring, one glaring gap remains wide open: your multi-function printers (MFPs).

What the GSA Data Breach Teaches Us About Insider Threats and Sensitive Data Exposure
Cloud‑based collaboration platforms such as Google Drive, Microsoft OneDrive and Dropbox are woven into the fabric of modern work for individuals, small businesses and large enterprises alike. They enable near‑instantaneous sharing, version control and remote access — but they also democratize risk: a single misclick can expose thousands of files at once.

When a Privileged User Goes Rogue
An ex-employee of Eaton Corporation in Ohio was found guilty of federal charges, including sabotaging his former employer with custom malware, a "kill switch" on the company network, and data theft, bringing to light the risks and challenges of managing your highly privileged users.

Walking Out the Door: Why Employees Are 69% More Likely to Take Data Before Resigning
Employees come and go from their employers every day, but would you know if an employee was taking some information with them when they left? Studies show that employees are 69% more likely to take data right before they resign.

Why eDLP Matters: Protecting Your Data in a Digital World
Data breaches and cyber threats are everywhere these days. Whether it’s a hacker, an insider threat, or just human error, keeping sensitive information safe has never been more critical. That’s where Endpoint Data Loss Prevention (eDLP) comes in.
