Skip to content

Risk Glossary

Insider Risk Glossary


A cloud access security broker (CASB) is a security policy enforcement point that is deployed either on-premises or in the cloud. Learn the objective of a CASB and what solutions it can provide.

Learn More

Cloud Application Security

Cloud application security aims to protect a company’s applications and data that live in the cloud – from sales lists to source code to product roadmaps. Successful implementation enhances cloud data visibility and maintains a secure workplace.

Learn More

Data Breach

Data breaches can happen in any-sized business and often involve confidential data like a company’s intellectual property, trade secrets or customers’ personally identifiable information (PII).

Learn More

Data Exfiltration

Effective data exfiltration prevention requires an understanding of the reasons why someone with access to sensitive data is attempting to take it from the company.

Learn More

Data Loss Prevention

Data loss prevention is vital to an organization because the theft or misuse of corporate data can harm the organization in a variety of different ways.

Learn More

Data Security

Data security is a top-of-mind priority for many organizations. Learn the factors driving data security and the variety of tools and techniques organizations use meet their data security needs.

Learn More

Endpoint Security

Remote work impacts endpoint security because remote workers’ computers are now outside the perimeter that organizations’ perimeter-focused security solutions are designed to protect.

Learn More

Incident Response

Responding to a security incident is a multi-stage process. Discover 6 easy steps to building a proactive incident response strategy.

Learn More

Insider Risk

Insider Risk is different from insider threats. Insider Risk focuses on an organization’s data problems rather than its people problems.

Learn More

Insider Threat

Most organizations focus on potential cyber threats originating from outside of their networks. However, this isn’t the only potential source of risk to a company.

Learn More

Insider Threat Program

An effective insider threat program balances the risks of insider threats with the needs of the company and its employees.

Learn More

Intellectual Property Theft

Loss of intellectual property can significantly hurt a company’s profitability and reputation. It is essential to take steps to secure and protect this IP.

Learn More

Risk Management Framework

A risk management framework (RMF) enables an organization to make intelligent decisions about how it will address the various risks faced by the business. Learn the six ways to develop an RFM.

Learn More

Shadow IT

Shadow IT is one of the trickiest issues facing IT and security leaders around the world – and one of the hardest to quantify. Some of the most innovative organizations are focusing on bringing it out of the shadows to empower employees and enable the business.

Learn More


By combining the functions of SIM and SEM, SIEM becomes a single solution for collecting and analyzing log and event data to identify trends, anomalies, vulnerabilities, and security incidents. It can also support security personnel in responding to these incidents.

Learn More

Types of Insider Threat

Insider threats can have a number of different objectives and motivations. Learn the six most common types of insider threats.

Learn More

Unstructured Data

Unstructured data comprises 80-90% of all data in our world today — and its exponential rate of growth far outpaces that of structured data.

Learn More

Zero Trust

Zero trust security provides protection against a number of different threats that perimeter-based security cannot. Learn key principles and how to implement a zero trust security strategy.

Learn More

Be AwaRe

11 real-life examples of insider threats

Insider threats can affect companies of all sizes in all industries. These 11 cases show the harm they can cause if companies don’t prevent or detect them.

Read Blog