Computer user touching on Microsoft Edge, a web browser developed by Microsoft, icon on Windows 10 to open the program.

Securing Microsoft 365 Without E3 Or E5 Licenses

| | Product
Customers are increasingly looking to protect their Microsoft 365 investments without having to upgrade to E3/E5 licenses. And while you may have been convinced that this was somehow “free” (in case you already live in E3/E5 world), nothing truly is.  To access and use Microsoft Insider Risk Management, organizations must ... Read More
Computer user touching on Microsoft Edge, a web browser developed by Microsoft, icon on Windows 10 to open the program.

Securing Microsoft 365 without E3 or E5 Licenses

| | Product
Customers are increasingly looking to protect their Microsoft 365 investments without having to upgrade to E3/E5 licenses. And while you may have been convinced that this was somehow “free” (in case you already live in E3/E5 world), nothing truly is.  To access and use Microsoft Insider Risk Management, organizations must ... Read More
Protecting Enterprise Data from Insider Risk Using Code42

Protecting Enterprise Data from Insider Risk Using Code42

| | Industry Insights
A TECH REPORT FROM EDWARD AMOROSO, TAG CYBER Fresh from our time at the Gartner Security & Risk Management Summit, this tech report from Ed Amoroso, Tag Cyber couldn’t be more timely. As noted, there has been a lot of discussion around Insider Risk Management (IRM) of late. Yet, questions ... Read More
Protecting Enterprise Data From Insider Risk Using Code42

Protecting Enterprise Data From Insider Risk Using Code42

| | Industry Insights
A TECH REPORT FROM EDWARD AMOROSO, TAG CYBER Fresh from our time at the Gartner Security & Risk Management Summit, this tech report from Ed Amoroso, Tag Cyber couldn’t be more timely. As noted, there has been a lot of discussion around Insider Risk Management (IRM) of late. Yet, questions ... Read More
Gartner Security & Risk Management Summit – 5 IRM Takeaways

Gartner Security & Risk Management Summit – 5 IRM Takeaways

| | Industry Insights
How do you summarize three days of jam-packed security sessions (150+ to be exact) to 5 key takeaways? Especially when those sessions address challenges most critical to security and risk management leaders. In my case, I get to look at them strictly through an Insider Risk Management (IRM) vernacular so ... Read More
Gartner Security & Risk Management Summit – 5 IRM Takeaways

Gartner Security & Risk Management Summit – 5 IRM Takeaways

| | Industry Insights
How do you summarize three days of jam-packed security sessions (150+ to be exact) to 5 key takeaways? Especially when those sessions address challenges most critical to security and risk management leaders. In my case, I get to look at them strictly through an Insider Risk Management (IRM) vernacular so ... Read More
7 Things Security Managers Should Require from a Data Protection Solution

7 Things Security Managers Should Require from a Data Protection Solution

| | Product
The data security world is hyper-focused on the rapidly expanding risk presented by the modern work environment of hybrid employees and cloud-powered collaboration. The result is a proliferation of tools and tech that make it difficult for data security teams and security administrators to explore their options. Here are the ... Read More
7 Things Security Managers Should Require From a Data Protection Solution

7 Things Security Managers Should Require From a Data Protection Solution

| | Product
The data security world is hyper-focused on the rapidly expanding risk presented by the modern work environment of hybrid employees and cloud-powered collaboration. The result is a proliferation of tools and tech that make it difficult for data security teams and security administrators to explore their options. Here are the ... Read More
Yahoo Lawsuit Alleges Employee Stole Trade Secrets Upon Receiving Job Offer From Direct Competitor

Yahoo Lawsuit Alleges Employee Stole Trade Secrets Upon Receiving Job Offer From Direct Competitor

| | Industry Insights
What’s common to Cartier, Pfizer, Block, Tesla and Apple in the past several months? They have all had high-profile insider data exfiltration or IP theft events. Now add Yahoo to this “not so exclusive” list. These are clear examples that data portability during this high job turnover economy is rampant ... Read More
Yahoo Lawsuit Alleges Employee Stole Trade Secrets Upon Receiving Job Offer From Direct Competitor

Yahoo Lawsuit Alleges Employee Stole Trade Secrets Upon Receiving Job Offer From Direct Competitor

| | Industry Insights
What’s common to Cartier, Pfizer, Block, Tesla and Apple in the past several months? They have all had high-profile insider data exfiltration or IP theft events. Now add Yahoo to this “not so exclusive” list. These are clear examples that data portability during this high job turnover economy is rampant ... Read More