All Articles
Jim Mazotas
In the News

When Your Biggest Threat Wears a Company Badge: What Apple's Latest Lawsuit Teaches Us About Insider Risk

Picture this: You're Apple, one of the most security-conscious companies on the planet. You've got cutting-edge tech, massive security budgets, and some of the brightest minds in the industry. Yet in June 2025, you find yourself filing a lawsuit against a former senior hardware engineer who allegedly walked away with thousands of confidential files about your Vision Pro headset.

Meet Di Liu, who, according to Apple's legal complaint, didn't need to hack anything. He simply used his legitimate access to copy sensitive files to personal cloud storage before jumping ship to Snap. The kicker? He apparently tried to cover his tracks by renaming files, reorganizing folders, and deleting logs on his company MacBook. Classic insider behavior, and it almost worked.

Déjà Vu: The Waymo Wake-Up Call

If this sounds familiar, it should. Back in 2017, Waymo (Google's self-driving car division) faced a nearly identical situation. Engineer Anthony Levandowski downloaded about 14,000 files before leaving for Uber, ultimately costing the companies $245 million to settle.

Here's what's alarming about both cases. These weren't small startups with limited resources. Apple and Waymo represent the pinnacle of technological sophistication. They have security teams that other companies dream of. Yet both missed the same type of threat, the insider with legitimate access who decides to take a little "insurance policy" with them to their new job.

The uncomfortable truth? If it happened to them, it's probably happening elsewhere too.

Your Cloud Is Their Exit Strategy

Remember when data theft meant sneaking out USB drives or burning CDs? Those days are long gone. Today's insider threats are much more elegant and much harder to spot.

Modern employees live in the cloud. Google Drive, Dropbox, OneDrive, iCloud—these tools are as common as email. And for someone looking to take data with them, they're perfect. No physical evidence, no suspicious hardware, just a few clicks to upload files to personal accounts.

Here's where it gets tricky for security teams: Traditional data loss prevention (DLP) tools often can't see these transfers. Once someone uploads a file through a web browser to their personal cloud account, it's game over. The data is gone, and you might not even know it happened.

What Makes These Cases So Dangerous

The scary part about incidents like Liu's isn't their sophistication; it's their simplicity. These aren't subtle behavioral anomalies that require complex AI to detect. They're concrete actions that should raise immediate red flags:

  • Suddenly accessing large volumes of sensitive files (especially near departure)
  • Uploading confidential data to personal accounts
  • Renaming or deleting files to hide activity
  • Continuing to access systems after giving notice

These aren't edge cases or false positives. They're policy violations are happening in real-time. The question is: can your security tools see them?

A Different Approach: Focus on Actions, Not Predictions

Many insider risk solutions try to build behavioral profiles and detect anomalies. But what if we flipped the script? Instead of trying to predict who might become a threat, what if we focused on detecting the actual actions that constitute data theft?

This is where targeted insider DLP becomes crucial. Here's what organizations need to catch incidents like Apple's:

Real-time visibility into file transfers: Especially for large volumes or unusual patterns, particularly to cloud destinations.

Cloud app monitoring: Whether someone's using approved tools or shadow IT, you need to know when sensitive data leaves your environment.

File manipulation tracking: Renaming, reorganizing, or deleting sensitive files, especially by departing employees, should trigger immediate alerts.

Enhanced departure protocols: When someone gives notice, their access to crown-jewel data should be monitored much more closely.

Forensic-grade logging: If you do face a legal battle, you need detailed evidence of exactly what happened and when.

Questions Every Security Leader Should Ask

To avoid becoming the next headline, here are the hard questions you need to answer:

  • Can you see when employees upload files to personal cloud accounts?
  • Do you get alerts when sensitive files are renamed or deleted?
  • Are departing employees monitored differently from active staff?
  • Can you tell the difference between approved and shadow cloud usage?
  • If you faced a lawsuit tomorrow, would your logs support your case?

If any of these answers is "no" or "maybe," you've got work to do.

Reality Check

Insider data theft isn't some exotic threat; it's a business reality. From Waymo to Apple, even the most prepared organizations can be caught off guard when trusted employees make bad choices.

The good news? Unlike advanced persistent threats or zero-day exploits, insider risk involves observable actions. People have to actually do things to steal data, access files, upload them, rename them, and delete logs. These actions leave digital footprints.

The key is having the right tools to see those footprints in real-time and respond before the damage is done. Because somewhere in your organization right now, there's probably someone with access to sensitive data who's thinking about their next career move.

The question isn't whether you'll face an insider threat; it's whether you'll detect it in time to do something about it.

Ready to assess your organization's insider risk? Start by auditing your visibility into cloud file transfers and employee data access patterns. The next Di Liu might already be sitting in your office.

read next
Risks

Data Harvesting and the Grazing Threat You're Probably Missing

July 9, 2025

Data harvesting is when people—usually insiders—gradually collect sensitive data without authorization, whether they plan to misuse it or just don't realize they're crossing a line. The "data grazing" analogy really captures what makes this so sneaky: it's like cattle slowly eating their way through a field.

Risks

The Slow-Motion Heist: When Good Employees Go Bad (And Nobody Notices)

July 2, 2025

The most dangerous insider threats don't announce themselves with dramatic gestures or obvious red flags. They whisper rather than shout, operating in the gray spaces between legitimate access and malicious intent.

In the News

The Industry Migration Pattern: Why Scattered Spider's Move to Aviation Signals Danger for Every Sector

July 1, 2025

Scattered Spider's evolution reveals a troubling progression from hospitality and entertainment (MGM Resorts, Caesars Entertainment) to retail (Marks & Spencer) to Silicon Valley technology companies. Now they're targeting aviation with the same proven methodology. How do you prepare for the next move?