All Articles
Jim Mazotas
In the News

When Your Biggest Threat Wears a Company Badge: What Apple's Latest Lawsuit Teaches Us About Insider Risk

Picture this: You're Apple, one of the most security-conscious companies on the planet. You've got cutting-edge tech, massive security budgets, and some of the brightest minds in the industry. Yet in June 2025, you find yourself filing a lawsuit against a former senior hardware engineer who allegedly walked away with thousands of confidential files about your Vision Pro headset.

Meet Di Liu, who, according to Apple's legal complaint, didn't need to hack anything. He simply used his legitimate access to copy sensitive files to personal cloud storage before jumping ship to Snap. The kicker? He apparently tried to cover his tracks by renaming files, reorganizing folders, and deleting logs on his company MacBook. Classic insider behavior, and it almost worked.

Déjà Vu: The Waymo Wake-Up Call

If this sounds familiar, it should. Back in 2017, Waymo (Google's self-driving car division) faced a nearly identical situation. Engineer Anthony Levandowski downloaded about 14,000 files before leaving for Uber, ultimately costing the companies $245 million to settle.

Here's what's alarming about both cases. These weren't small startups with limited resources. Apple and Waymo represent the pinnacle of technological sophistication. They have security teams that other companies dream of. Yet both missed the same type of threat, the insider with legitimate access who decides to take a little "insurance policy" with them to their new job.

The uncomfortable truth? If it happened to them, it's probably happening elsewhere too.

Your Cloud Is Their Exit Strategy

Remember when data theft meant sneaking out USB drives or burning CDs? Those days are long gone. Today's insider threats are much more elegant and much harder to spot.

Modern employees live in the cloud. Google Drive, Dropbox, OneDrive, iCloud—these tools are as common as email. And for someone looking to take data with them, they're perfect. No physical evidence, no suspicious hardware, just a few clicks to upload files to personal accounts.

Here's where it gets tricky for security teams: Traditional data loss prevention (DLP) tools often can't see these transfers. Once someone uploads a file through a web browser to their personal cloud account, it's game over. The data is gone, and you might not even know it happened.

What Makes These Cases So Dangerous

The scary part about incidents like Liu's isn't their sophistication; it's their simplicity. These aren't subtle behavioral anomalies that require complex AI to detect. They're concrete actions that should raise immediate red flags:

  • Suddenly accessing large volumes of sensitive files (especially near departure)
  • Uploading confidential data to personal accounts
  • Renaming or deleting files to hide activity
  • Continuing to access systems after giving notice

These aren't edge cases or false positives. They're policy violations are happening in real-time. The question is: can your security tools see them?

A Different Approach: Focus on Actions, Not Predictions

Many insider risk solutions try to build behavioral profiles and detect anomalies. But what if we flipped the script? Instead of trying to predict who might become a threat, what if we focused on detecting the actual actions that constitute data theft?

This is where targeted insider DLP becomes crucial. Here's what organizations need to catch incidents like Apple's:

Real-time visibility into file transfers: Especially for large volumes or unusual patterns, particularly to cloud destinations.

Cloud app monitoring: Whether someone's using approved tools or shadow IT, you need to know when sensitive data leaves your environment.

File manipulation tracking: Renaming, reorganizing, or deleting sensitive files, especially by departing employees, should trigger immediate alerts.

Enhanced departure protocols: When someone gives notice, their access to crown-jewel data should be monitored much more closely.

Forensic-grade logging: If you do face a legal battle, you need detailed evidence of exactly what happened and when.

Questions Every Security Leader Should Ask

To avoid becoming the next headline, here are the hard questions you need to answer:

  • Can you see when employees upload files to personal cloud accounts?
  • Do you get alerts when sensitive files are renamed or deleted?
  • Are departing employees monitored differently from active staff?
  • Can you tell the difference between approved and shadow cloud usage?
  • If you faced a lawsuit tomorrow, would your logs support your case?

If any of these answers is "no" or "maybe," you've got work to do.

Reality Check

Insider data theft isn't some exotic threat; it's a business reality. From Waymo to Apple, even the most prepared organizations can be caught off guard when trusted employees make bad choices.

The good news? Unlike advanced persistent threats or zero-day exploits, insider risk involves observable actions. People have to actually do things to steal data, access files, upload them, rename them, and delete logs. These actions leave digital footprints.

The key is having the right tools to see those footprints in real-time and respond before the damage is done. Because somewhere in your organization right now, there's probably someone with access to sensitive data who's thinking about their next career move.

The question isn't whether you'll face an insider threat; it's whether you'll detect it in time to do something about it.

Ready to assess your organization's insider risk? Start by auditing your visibility into cloud file transfers and employee data access patterns. The next Di Liu might already be sitting in your office.

read next
In the News

What the CrowdStrike Insider Case Reveals About Modern Insider Risk

November 26, 2025

CrowdStrike's recent insider incident is a sharp reminder that the most damaging security events often don't come from breaches at all. They come from people who already have access. In this case, an individual with valid credentials quietly captured internal screenshots and passed them to an external threat group.

Company

InnerActiv Adds Former Cardinal Health CEO Mike Kaufmann to Board, Former NSA Ops Director Jon Darby as Advisor

November 25, 2025

InnerActiv is honored to be joined by experts in the security field as we move forward

Risks

When AI Becomes Both the Target and the Protector: Rethinking Data Exfiltration in the Era of Intelligent Systems

November 21, 2025

The biggest security blind spot in your organization might be the AI you just deployed. When intelligent systems can steal, mutate, and exfiltrate data faster than legacy tools can detect, protecting the intelligence layer becomes as critical as protecting the infrastructure beneath it.