Risk Glossary
Insider Risk Glossary
CASB
A cloud access security broker (CASB) is a security policy enforcement point that is deployed either on-premises or in the cloud. Learn the objective of a CASB and what solutions it can provide.
Learn MoreCloud Application Security
Cloud application security aims to protect a company’s applications and data that live in the cloud – from sales lists to source code to product roadmaps. Successful implementation enhances cloud data visibility and maintains a secure workplace.
Learn MoreData Breach
Data breaches can happen in any-sized business and often involve confidential data like a company’s intellectual property, trade secrets or customers’ personally identifiable information (PII).
Learn MoreData Exfiltration
Effective data exfiltration prevention requires an understanding of the reasons why someone with access to sensitive data is attempting to take it from the company.
Learn MoreData Loss Prevention
Data loss prevention is vital to an organization because the theft or misuse of corporate data can harm the organization in a variety of different ways.
Learn MoreData Security
Data security is a top-of-mind priority for many organizations. Learn the factors driving data security and the variety of tools and techniques organizations use meet their data security needs.
Learn MoreEndpoint Security
Remote work impacts endpoint security because remote workers’ computers are now outside the perimeter that organizations’ perimeter-focused security solutions are designed to protect.
Learn MoreIncident Response
Responding to a security incident is a multi-stage process. Discover 6 easy steps to building a proactive incident response strategy.
Learn MoreInsider Risk
Insider Risk is different from insider threats. Insider Risk focuses on an organization’s data problems rather than its people problems.
Learn MoreInsider Threat
Most organizations focus on potential cyber threats originating from outside of their networks. However, this isn’t the only potential source of risk to a company.
Learn MoreInsider Threat Program
An effective insider threat program balances the risks of insider threats with the needs of the company and its employees.
Learn MoreIntellectual Property Theft
Loss of intellectual property can significantly hurt a company’s profitability and reputation. It is essential to take steps to secure and protect this IP.
Learn MoreRisk Management Framework
A risk management framework (RMF) enables an organization to make intelligent decisions about how it will address the various risks faced by the business. Learn the six ways to develop an RFM.
Learn MoreShadow IT
Shadow IT is one of the trickiest issues facing IT and security leaders around the world – and one of the hardest to quantify. Some of the most innovative organizations are focusing on bringing it out of the shadows to empower employees and enable the business.
Learn MoreSIEM
By combining the functions of SIM and SEM, SIEM becomes a single solution for collecting and analyzing log and event data to identify trends, anomalies, vulnerabilities, and security incidents. It can also support security personnel in responding to these incidents.
Learn MoreTypes of Insider Threat
Insider threats can have a number of different objectives and motivations. Learn the six most common types of insider threats.
Learn MoreUnstructured Data
Unstructured data comprises 80-90% of all data in our world today — and its exponential rate of growth far outpaces that of structured data.
Learn MoreZero Trust
Zero trust security provides protection against a number of different threats that perimeter-based security cannot. Learn key principles and how to implement a zero trust security strategy.
Learn MoreBe AwaRe
11 real-life examples of insider threats
Insider threats can affect companies of all sizes in all industries. These 11 cases show the harm they can cause if companies don’t prevent or detect them.
Read Blog