The Future Workforce is One of Empathy

The world has changed, and so too has the way we work. Employees now want and expect faster, smarter, and more flexible modes of working than ever before. More importantly, they now ...

Mitigating Malicious Insider Threats in a Hybrid World

Over the past two years, IT and cybersecurity teams have faced the challenge of protecting data while employees work almost exclusively outside the protection of corporate networks. So, it was especially fitting ...

Reducing Insider Risk Through Employee Empathy

We have written before about the Great Resignation and the risk of people taking sensitive data to their new employers. People reassessing their priorities and opportunities as the pandemic eased coincided with ...

Remote Workforce Analytics WITH Remote Workforce Trust

In an earlier post we introduced readers to Workforce Cyber Intelligence. To recap briefly, Workforce Cyber Intelligence provides organizations with operational intelligence synthesized from an employee’s physical interactions with organizational assets (data, ...

Thoughts on Gartner’s 2022 Market Guide for Data Loss Prevention

With another Summer comes another addition of the Gartner Market Guide for Data Loss Prevention. More key findings, more great analysis and more well thought out recommendations for Security Risk Management (SRM) ...

Employees’ Side Hustles: The Hidden Threat to Your Organization’s Cybersecurity

Do your employees have a side gig they’re passionate about? They may be unintentionally putting your security at risk. Here’s why you shouldn’t overlook those side gigs. A 2021 report by the U.S ...
What to Consider in your Multinational IRM program

What to Consider in your Multinational IRM program

In a previous post we discussed why companies need a multi-national strategy when building their Insider Risk Management (IRM) program. Briefly, it’s far too easy for organizations to be tripped up by ...

Time to Value for Insider Risk Management is Key to Adoption & Success

In previous posts we have covered several critical factors for organizations to consider when comparing insider risk management and insider threat surveillance solutions. This post will discuss a more basic business factor: ...

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 2)

A few weeks ago we shared with you the first part of our two-part blog series summarizing the key takeaways of the e-book we co-authored with Splunk, “An Insider Risk Management Approach ...

Understanding Behavioral Intent Doesn’t Equal Invasive Surveillance

One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration), for security professionals is the need to understand user behavior better. WFA forced ...