What comes to mind when you think of industrial espionage — or economic or corporate espionage? Is it something like foreign spies sneaking into a defense contractor facility to steal fighter jet technology? Of course, that does happen. State-sponsored spying is responsible for the theft of billions of dollars of…
Read More
Sometimes, it only takes one moment — one life-changing incident — for the most trustworthy employee to become an insider threat. As Nick Cavalancia, founder of Microsoft MVP, observed at Spiceworld 2019, malicious user behavior is all about intent. Coming up with the best approach to addressing insider threats means…
Read More
This is the second installment in a two-part series about data discovery and classification. Be sure to read part one for the full story. Discovering and classifying data across the enterprise is crucial to any data protection strategy, but it can be complicated due to the constantly shifting nature of…
Read More
Incident response and management requires continual growth. Your team will not become proficient overnight, and acquiring knowledge, expertise and maturity takes time, effort, training and a lot of practice. It’s also not a single milestone that you reach and then rest on your laurels. As attackers continue to apply innovative…
Read More