search search linkedin facebook twitter youtube googleplus play envelope open arrow-right-circle

ObserveIT is now a part of proofpoint

About Proofpoint »

observeit-logo
  • Solutions
        • Use Cases
          • Securing the Remote Worker
          • Protect from Data Loss
          • Identify User Risk
          • Accelerate Incident Response
          • Bridge Compliance Gaps
        • Verticals
          • Financial Services
          • Technology
          • Manufacturing
        • Insider Threat Risk Assessment
  • Product
          • Contextual Intelligence
          • Threat Signals
          • Real Time Response
          • Integrations
          • Privacy
        • Insider Threat Risk Assessment
  • Company
          • About Us
          • Careers
          • Why Insider Threat?
          • Partners
          • Customers
          • Blog
          • Resources
          • Support
          • Cost of Insider Threats
          • Contact
        • Insider Threat Risk Assessment
  • Free Trial

Category: Industry Trends

  • All Topics
  • Coachable Moments
  • Compliance
  • Data Protection
  • Events
  • Industry Trends
  • Insider Threat Management
  • News
  • Privacy
  • Product

People-Centric Security Threats: Takeaways from The Economist Intelligence Unit’s “Cyber Insecurity” Briefing

Josh Epstein - May 7, 2020

New Infographic: Uncovering the Hidden Cost of Insider Threats

Josh Epstein - April 30, 2020

Three Ways the Role of CISOs Has Changed Over the Last Decade

Team ObserveIT - February 18, 2020

The Skyrocketing Costs of Insider Threat Investigations

Josh Epstein - February 10, 2020

Top 5 Insider Threat Best Practices to Prepare for 2020

Sai Chavali - December 18, 2019

How Corporate Culture Weighs Into an Insider Threat Program

Team ObserveIT - August 20, 2019

Data Exfiltration Channels Used by Attackers (and How to Defend Them)

Sai Chavali - August 12, 2019

How to Deal with High-Risk Users and Prevent Insider Threats

Team ObserveIT - July 19, 2019

New Gartner Report Highlights Shifting Approach Toward Insider Threats

Mayank Choudhary - June 18, 2019

2019 Verizon Data Breach Investigations Report Shows Spike in Insider Threats: Our Top 3 Takeaways

Team ObserveIT - May 21, 2019

  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Next

Popular Posts

10 Best Practices for Network Security Management
10 Essential Cybersecurity Best Practices | ObserveIT
ObserveIT is Officially a Proofpoint Company: Reflections on the Synergy Behind Successful Cybersecurity M&A

Recent Posts

  • 3 Myths About Protecting Data and Sensitive IP from Insider Threats
  • 3 Things to Know About Insider Threats in the Gig Economy
  • How to Combat the Three Most Common Insider Threats

Solution

  • Use Cases
    • Securing the Remote Worker
    • Protect from Data Loss
    • Identify User Risk
    • Bridge Compliance Gaps
    • Accelerate Incident Response
  • Veritcals
    • Financial Services
    • Technology
    • Manufacturing

Product

  • Contextual Intelligence
  • Threat Signals
  • Real Time Response
  • Integrations
  • Privacy

Company

  • About Us
  • Blog
  • Careers
  • Why Insider Threat?
  • Cost of Insider Threats
  • Support
  • Resources
  • Customers
  • Partners
  • Contact
  • Privacy Policy
TRUSTe
logo-lockup
Copyright © 2021 ObserveIT