Feb. 16, 2023, 3:20 p.m. | Sergey Voynov

Hacker Noon - cybersecurity hackernoon.com

The recent wave of leaked confidential information has raised concerns about the security measures in place to protect sensitive information. The fact that the source of these leaks is not outsiders but insiders - trusted employees with access to the confidential information - highlights the need for organizations to re-evaluate their approach to insider threat protection. In this article, we'll explore what measures organizations can take to secure against insider leaks.

Read All

access article business strategy ciso confidential cybersecurity cyber security awareness cyber threats employees fact guide information insider insiders insider threat insider threats leaked leaks organizations protect protection security sensitive information threat threat protection threats

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Engineer

@ Alstom | Charleroi, BE

Member of Compliance, Information Technology

@ Anchorage Digital | United States

Information Security Consultant (GRC) - Cumulus Systems

@ Hitachi | (HIL) DELHI - RHQ

Security Engineer

@ EarnIn | Mexico