News & Insights

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Risks

Data Harvesting and the Grazing Threat You're Probably Missing

July 9, 2025

Data harvesting is when people—usually insiders—gradually collect sensitive data without authorization, whether they plan to misuse it or just don't realize they're crossing a line. The "data grazing" analogy really captures what makes this so sneaky: it's like cattle slowly eating their way through a field.

In the News

When Your Biggest Threat Wears a Company Badge: What Apple's Latest Lawsuit Teaches Us About Insider Risk

July 8, 2025

Picture this: You're Apple, one of the most security-conscious companies on the planet. You've got cutting-edge tech, massive security budgets, and some of the brightest minds in the industry. Yet in June 2025, you find yourself filing a lawsuit against a former senior hardware engineer who allegedly walked away with thousands of confidential files about your Vision Pro headset.

Risks

The Slow-Motion Heist: When Good Employees Go Bad (And Nobody Notices)

July 2, 2025

The most dangerous insider threats don't announce themselves with dramatic gestures or obvious red flags. They whisper rather than shout, operating in the gray spaces between legitimate access and malicious intent.

In the News

The Industry Migration Pattern: Why Scattered Spider's Move to Aviation Signals Danger for Every Sector

July 1, 2025

Scattered Spider's evolution reveals a troubling progression from hospitality and entertainment (MGM Resorts, Caesars Entertainment) to retail (Marks & Spencer) to Silicon Valley technology companies. Now they're targeting aviation with the same proven methodology. How do you prepare for the next move?

Risks

The Hidden Threat of Shadow AI: What You Can't See Will Hurt You

June 27, 2025

This isn't theoretical—it's happening right now. A marketing manager pastes customer feedback into ChatGPT to generate campaign ideas. An HR representative uploads resumes to an AI tool for initial screening. A finance analyst shares budget data with an AI assistant to create forecasts.

Risks

Shadow IT: The Hidden Threat Lurking in Your Office

June 20, 2025

Welcome to Shadow IT—the parallel digital universe running alongside your official corporate infrastructure, completely invisible to the people whose job it is to keep your company secure.

Technology

ISO 27001:2022’s New DLP Requirement – Is Your Organization Ready?

June 20, 2025

In October 2022, ISO published a major update to the 27001 standard. Among the key changes was a new control requirement under section 8.1, focused entirely on Data Leakage Prevention.‍This control requires organizations to implement data leakage prevention measures across all systems, networks, and devices that process, store, or transmit sensitive data.

In the News

He Was Paid to Catch Insider Threats. Instead, He Became One

June 17, 2025

Laatsch wasn't some disgruntled contractor or overlooked temp worker. He was a 28-year-old IT specialist with the Defense Intelligence Agency, holding Top Secret clearance and working within the very division designed to prevent exactly what he was attempting: the Insider Threat Division.

In the News

Evoke Wellness: How a Trusted Employee Exploited Access for Nearly Three Years

June 12, 2025

This case occurred at a relatively small, specialized healthcare facility. Insider threats aren't just a "big company problem" – they affect organizations of any size

In the News

Coinbase Data Breach 2025: Insider Threat Attack Exposes Need for Real-Time Endpoint Security and DLP Solutions

May 27, 2025

The recent Coinbase data breach 2025 has sent shockwaves through the cybersecurity community. Extortionists successfully targeted and coerced Coinbase employees to access sensitive customer information, demonstrating how insider threats and data loss prevention (DLP) failures remain among the most damaging cybersecurity vulnerabilities in financial services.

In the News

Why Industry Recognition Matters: What Our 2025 "Hot Company" Award Says About the Future of Cybersecurity

May 23, 2025

The cybersecurity industry is finally catching up to what we've known all along—the most dangerous threats don't come from outside your walls. They come from the people you trust most.

Risks

The Hidden Data Breach: 3 Ways Your Office Printers Are Exposing Sensitive Information

May 20, 2025

In today's complex threat landscape, comprehensive security means eliminating blind spots. Your multi-function printers represent a critical gap in traditional security architectures—one that insider threats are increasingly exploiting.

Technology

The Office Security Threat You're Probably Ignoring: Your Printers

May 16, 2025

That printer sitting in your office corner? It might just be your biggest security blind spot. While your IT team fortifies digital defenses with fancy endpoint protection and network monitoring, one glaring gap remains wide open: your multi-function printers (MFPs).

Technology

What the GSA Data Breach Teaches Us About Insider Threats and Sensitive Data Exposure

April 21, 2025

Cloud‑based collaboration platforms such as Google Drive, Microsoft OneDrive and Dropbox are woven into the fabric of modern work for individuals, small businesses and large enterprises alike. They enable near‑instantaneous sharing, version control and remote access — but they also democratize risk: a single misclick can expose thousands of files at once.

Company

See InnerActiv at RSAC™ 2025 Conference

April 14, 2025

Read to see InnerActiv live in action? Come visit us and learn about how we're revolutionizing eDLP!

In the News

Oops! When Human Error Meets National Security: Lessons from the Signal Chat Incident

April 2, 2025

Human error remains one of the biggest security threats, no matter how sophisticated the technology. Studies consistently show that human error is a leading cause of security breaches.

In the News

When a Privileged User Goes Rogue

March 19, 2025

An ex-employee of Eaton Corporation in Ohio was found guilty of federal charges, including sabotaging his former employer with custom malware, a "kill switch" on the company network, and data theft, bringing to light the risks and challenges of managing your highly privileged users.

Risks

Walking Out the Door: Why Employees Are 69% More Likely to Take Data Before Resigning

February 28, 2025

Employees come and go from their employers every day, but would you know if an employee was taking some information with them when they left? Studies show that employees are 69% more likely to take data right before they resign.

Technology

The Hidden Threat: How Employee Fraud is Draining Businesses & How to Stop It

February 18, 2025

Running a business is tough enough without having to worry about fraud from your own employees.

In the News

The Insider Threat: Lessons from the MISL Data Breach

February 18, 2025

The MISL breach serves as a reminder that insider threats are just as dangerous as external cyber-attacks, highlighting missed warnings and fraud.

Technology

Why eDLP Matters: Protecting Your Data in a Digital World

February 18, 2025

Data breaches and cyber threats are everywhere these days. Whether it’s a hacker, an insider threat, or just human error, keeping sensitive information safe has never been more critical. That’s where Endpoint Data Loss Prevention (eDLP) comes in.