Features and Benefits
Blog
Contact us
Home
-
Employee
-
Page 2
Category:
Employee
CATEGORIES
AI and Machine Learning
CEO
CIO
CISO
Cloud
Data Breach
Data Classification
Data Governance
Data Leakage Prevention
Defence & Intelligence
Digital Forensics
Employee
Financial Institutions
Healthcare
Information Security
Insider Risk
Insider Risk Management
Investigations
Legal
Manufacturing
Privacy
Process and Procedures
Psychology
Regulation
Remote working
Security
Security Awareness
Security Culture
Uncategorized
University Sector
Select Category
AI and Machine Learning
CEO
CIO
CISO
Cloud
Data Breach
Data Classification
Data Governance
Data Leakage Prevention
Defence & Intelligence
Digital Forensics
Employee
Financial Institutions
Healthcare
Information Security
Insider Risk
Insider Risk Management
Investigations
Legal
Manufacturing
Privacy
Process and Procedures
Psychology
Regulation
Remote working
Security
Security Awareness
Security Culture
Uncategorized
University Sector
Analysing the Twilio data breach of 2023: A case study in insider risk and social engineering
November 20, 2023
by
Christopher McNaughton
The Breach In mid-2023, Twilio, a major player in cloud communications, suffered a…
Read More >
The Ubiquiti data theft: A case study in insider risk and the necessity of vigilant monitoring
November 15, 2023
by
Christopher McNaughton
Introduction to the Ubiquiti Data Theft Incident In the dynamic world of network…
Read More >
The spy who cost billions: A case study on corporate espionage and the value of vigilance
November 13, 2023
by
Christopher McNaughton
When Appian was awarded $2.036 billion in a legal battle against Pegasystems, it…
Read More >
Mitigating insider risks - A deeper dive into the Cash App data breach
November 8, 2023
by
Christopher McNaughton
The breach at Cash App, where a former employee accessed customer data without…
Read More >
The looming threat: State-sponsored attacks and insider risks across industries
November 6, 2023
by
Christopher McNaughton
In today's interconnected world, the landscape of cyber threats has evolved dramatically. State-sponsored…
Read More >
The ABC of implementing an Insider Risk Program
October 30, 2023
by
Christopher McNaughton
Implementing an insider risk program is a critical aspect of modern data governance…
Read More >
Redefining cybersecurity training: How insider risk detection is revolutionising employee awareness
October 26, 2023
by
Christopher McNaughton
In the ever-evolving landscape of cybersecurity, traditional methods of employee training, such as…
Read More >
Navigating the hidden dangers: Why insider risks are the titanic icebergs of organisations
October 23, 2023
by
Christopher McNaughton
In the realm of cybersecurity, organisations often sail confidently, much like the Titanic…
Read More >
Navigating the maze of insider risk: A strategic approach for CISO’s
October 19, 2023
by
Christopher McNaughton
In the ever-evolving landscape of cybersecurity, Chief Information Security Officers (CISOs) find themselves…
Read More >
What gets measured gets managed - The imperative of implementing an insider risk management program.
October 16, 2023
by
Christopher McNaughton
In the age of escalating cyber threats and rapidly evolving technology, corporations are…
Read More >
« Previous
1
2
3
4
5
Next »
Features and Benefits
Blog
Contact us