Frequency of insider-related incidents per company
In the article, we will consider the average consolidated frequency of employee/contractor negligence, criminal/malicious insider and credential theft incidents per company.
What motivates unscrupulous insiders to act?
Key insider drivers and how to counteract them.
Data Breach and Insider Threat Response and Investigation
One of the costs associated with a company’s response to insider-related incidents is related to performing the investigation. What is an investigation? How can LeaksID help with it?
LeaksID’s place among Insider Threat Management (ITM) solutions
What is Insider Threat Management (ITM) solutions, who are insiders and what role does LeaksID technology play in protecting documents?
How many days do companies spend to contain one insider security incident?
We reveal sad figures, but also offer a solution.
What is an Insider Threat?
How can companies counter insider threat? What types of insider leaks exist? How to reduce insider risk with invisible labeling?
Document leaks via email: How to deter them
How the security of emails is ensured and how to ensure that an employee does not leak confidential documents by email, both personal and corporate?
What is Secure File Sharing: Key Tips to Protect your Documents
What are the file-sharing security risks? And what can help to ensure the secure exchange of documents?
Going beyond watermarks to protect sensitive documents from illegal access
Cyber threats continue to gain momentum and there are still not enough ways to counter it.
Security Boulevard
These are the 20 companies presenting at Alchemist Accelerator’s 26th Demo Day today
The enterprise-focused Alchemist Accelerator is hosting its 26th Demo Day today, with 20 companies expected to debut.
TechCrunch