search search linkedin facebook twitter youtube googleplus play envelope open arrow-right-circle

ObserveIT is now a part of proofpoint

About Proofpoint »

observeit-logo
  • Solutions
        • Use Cases
          • Securing the Remote Worker
          • Protect from Data Loss
          • Identify User Risk
          • Accelerate Incident Response
          • Bridge Compliance Gaps
        • Verticals
          • Financial Services
          • Technology
          • Manufacturing
        • Insider Threat Risk Assessment
  • Product
          • Contextual Intelligence
          • Threat Signals
          • Real Time Response
          • Integrations
          • Privacy
        • Insider Threat Risk Assessment
  • Company
          • About Us
          • Careers
          • Why Insider Threat?
          • Partners
          • Customers
          • Blog
          • Resources
          • Support
          • Cost of Insider Threats
          • Contact
        • Insider Threat Risk Assessment
  • Free Trial

Category: News

  • All Topics
  • Coachable Moments
  • Compliance
  • Data Protection
  • Events
  • Industry Trends
  • Insider Threat Management
  • News
  • Privacy
  • Product

ObserveIT is Officially a Proofpoint Company: Reflections on the Synergy Behind Successful Cybersecurity M&A

Team ObserveIT - November 26, 2019

Gitlab’s Hiring Ban Considerations Reflect the Rise of Nation-State Threats

Team ObserveIT - November 11, 2019

Why Broadcom’s Symantec Acquisition Won’t Solve their Insider Threat Problems

Team ObserveIT - November 11, 2019

What the Trend Micro Breach Can Tell Us About the Insider Threat Problem

Team ObserveIT - November 7, 2019

A New Chapter for ObserveIT: Why Joining Forces with Proofpoint Makes So Much Sense

Mike McKee - November 3, 2019

JetBlue Ticket Fraud a Classic Case of Malicious Insider Threat

Team ObserveIT - October 25, 2019

Employee Privacy: The Price of Data Protection

Chris Bush - October 25, 2019

Budweiser and Miller Battle Over Insider IP Theft

Team ObserveIT - October 18, 2019

Much Ado About Sudo Commands: Why They Can Lead to Insider Threats

Team ObserveIT - October 18, 2019

3 Ways to Wisely Invest Money Rescued from Insider Threat Incidents

Team ObserveIT - October 18, 2019

  • Page 1
  • Page 2
  • Page 3
  • …
  • Page 8
  • Next

Popular Posts

10 Best Practices for Network Security Management
10 Essential Cybersecurity Best Practices | ObserveIT
ObserveIT is Officially a Proofpoint Company: Reflections on the Synergy Behind Successful Cybersecurity M&A

Recent Posts

  • 3 Myths About Protecting Data and Sensitive IP from Insider Threats
  • 3 Things to Know About Insider Threats in the Gig Economy
  • How to Combat the Three Most Common Insider Threats

Solution

  • Use Cases
    • Securing the Remote Worker
    • Protect from Data Loss
    • Identify User Risk
    • Bridge Compliance Gaps
    • Accelerate Incident Response
  • Veritcals
    • Financial Services
    • Technology
    • Manufacturing

Product

  • Contextual Intelligence
  • Threat Signals
  • Real Time Response
  • Integrations
  • Privacy

Company

  • About Us
  • Blog
  • Careers
  • Why Insider Threat?
  • Cost of Insider Threats
  • Support
  • Resources
  • Customers
  • Partners
  • Contact
  • Privacy Policy
TRUSTe
logo-lockup
Copyright © 2021 ObserveIT