The 10 Biggest and Boldest Insider Threats of 2019 and 2020
That risk is only increasing in an era of remote working and distributed teams. Without a holistic security strategy in place, organizations face insider-caused breaches from negligent, malicious and compromised insiders.
This e-book reviews 10 headline-grabbing insider threat incidents that provide a useful glimpse into the reality of this growing threat. (Some of these occurred or began before 2019, but all have been disclosed or prosecuted in 2019 or 2020.) We explore:
Read More
By submitting this form you agree to Proofpoint contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Proofpoint web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
More resources from Proofpoint
Making the Move to Cloud-Based Archiving: A S...
Our digital world is generating a massive explosion of data coming from multiple communication channels. Legacy archiving systems are struggling to...
Threat Briefing: Supply Chain Attacks
Cyber criminals are getting bolder and more sophisticated with their threats. Supply chain attacks can create multiple victims from a single breach...
Stopping BEC and EAC Scams: A Guide for CISOs...
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi-layered defences. Cyber attackers have c...