The 10 Biggest and Boldest Insider Threats of 2019 and 2020
That risk is only increasing in an era of remote working and distributed teams. Without a holistic security strategy in place, organizations face insider-caused breaches from negligent, malicious and compromised insiders.
This e-book reviews 10 headline-grabbing insider threat incidents that provide a useful glimpse into the reality of this growing threat. (Some of these occurred or began before 2019, but all have been disclosed or prosecuted in 2019 or 2020.) We explore:
Read More
By submitting this form you agree to Proofpoint contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Proofpoint web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
More resources from Proofpoint
Proofpoint Information and Cloud Security Pla...
The Proofpoint Information and Cloud Security platform combines many of our products to address secure access, data loss prevention (DLP) and insid...
Bilfinger Protects Supply Chain Email Communi...
Restores confidence in email and prevents brand misuse through authentication.
Cyber criminals use fraudulent emails to target people, not in...
Measuring Security Awareness Impact for Long-...
Most security leaders know that an effective security awareness program can play an outsized role in reducing risk. But measuring—and communicati...