Blog

Blog

Insider Threat: Definition & Examples

A recent report said that almost half of data breaches involve an insider element. In this blog we define what constitutes an insider threat and give you nearly 50 examples to help illustrate the threat further.
Blog

IP Theft: Definition and Examples

IP theft can have long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.
Blog

EDR vs. EPP vs. MDR

In this blog we break down the differences between three different types of endpoint protection systems: EDR, EPP, and MDR.