Cyberhaven Blog
Filter by
-
March 28, 2023
Lessons from Twitter’s Data Breach: Protecting Your Source Code and Monitoring IP Movement
Read more -
March 3, 2023
Introducing Cyberhaven for AI: Security that keeps confidential data out of public AI models
Read more -
February 28, 2023
3.1% of workers have pasted confidential company data into ChatGPT
Read more -
January 20, 2023
How to protect company data when you’re preparing for a layoff
Read more -
December 22, 2022
MacOS Engineering: Two machine debug of Apple’s EndpointSecurity.framework
Read more -
November 16, 2022
Announcing Cyberhaven for Insider Threats
Read more -
October 31, 2022
SEC Slams Wall Street Banks with $1.8 Billion in Fines for Non-compliant Chat Apps
Read more -
October 26, 2022
Data Sprawl is Making Insider Threats More Frequent and More Damaging
Read more -
October 18, 2022
The 10 Most Common Forms of Company Data Employees Steal or Expose
Read more -
October 13, 2022
Hybrid Endpoint Security: Balancing Inline and Out-of-Band Approaches to Protect Data
Read more -
September 30, 2022
9% of Employees Exfiltrated Data in the First 6 Months of 2022
Read more -
September 19, 2022
Apple Car Engineer AirDropped 24GB of Prototype Designs to Wife’s Laptop Before Joining Competitor
Read more -
September 14, 2022
How the Great Resignation Fueled the Great Employee Data Heist
Read more -
August 27, 2022
Yahoo Employee Stole 570,000 Pages of Source Code the Day He Quit to Join a Competitor
Read more -
July 19, 2022
Uber and the Long Tail of Insider Risks
Read more -
July 12, 2022
Avoiding the Inkblot Problem of Insider Risk: How to Get Clarity and Take Action
Read more -
July 5, 2022
Why Insider Risk Management Needs to be Proactive Not Reactive
Read more -
June 22, 2022
12 Keys to Effective Insider Risk Management
Read more -
June 8, 2022
Data Security is Broken. The Comprehensive Cyber Capabilities Working Group is Here to Fix it.
Read more -
May 31, 2022
Finding Unexpected Security Gems With DDR
Read more -
May 27, 2022
Cyberhaven Product Update – May 2022
Read more -
May 5, 2022
Protecting Data Requires a New Level of Resolution
Read more -
April 12, 2022
Cyberhaven Product Update – April 2022
Read more -
April 8, 2022
What My Kids Taught Me About Data Security
Read more -
April 4, 2022
Why Insider Threat Risk Grows When Moving to the Cloud
Read more -
January 31, 2022
Cyberhaven Product Update – January 2022
Read more -
January 11, 2022
How Manufacturing and Financial Services Firms are Reinventing their Data Protection Programs
Read more -
December 21, 2021
Cyberhaven Product Update – December 2021
Read more -
December 14, 2021
Celebrating Cyberhaven’s $33M Series B Funding Round
Read more -
November 22, 2021
Cyberhaven Product Update – November 2021
Read more -
November 18, 2021
The Power of Graph Analytics to Protect Your Data
Read more -
October 20, 2021
Cyberhaven Product Update – October 2021
Read more -
October 6, 2021
How the World’s Largest Law Firm Reimagined Data Protection
Read more -
September 14, 2021
Cyberhaven Product Update – September 2021
Read more -
July 13, 2021
Introducing Cyberhaven’s Full Context Blocking… and how it can transform your data protection program
Read more -
May 4, 2021
Rethink DLP Roundtable
Read more -
April 8, 2021
Data Misuse Protection and Why It’s Important Now
Read more -
March 16, 2021
Why DLP Is as Outdated as the DVR, and How to Start Binge-Watching Your Data
Read more -
January 27, 2021
Securing Source Code Requires Securing the Commit…and a Whole Lot More
Read more -
December 15, 2020
Full Context Incident Response
Read more -
December 3, 2020
3 reasons why DLP needs to be done on the client
Read more -
December 3, 2020
Time To Value
Read more -
October 27, 2020
The Power of Long-Term Memory and Why You Need to Move On From Your Memento DLP
Read more -
October 20, 2020
More informative than a presidential debate – DLP vs. UBA
Read more -
September 24, 2020
Why Cyberhaven is the only day-zero DLP solution available for macOS Big Sur
Read more -
July 22, 2020
Data tracing vs. data tagging
Read more -
July 9, 2020
The next chapter in the Cyberhaven story
Read more -
July 7, 2020
Top 3 experts who can help you protect innovation capital in pharma
Read more -
June 23, 2020
The essential requirements checklist for insider threat solutions
Read more -
June 17, 2020
Security fatigue defeats security education
Read more -
June 9, 2020
Crying wolf – the challenge of alert fatigue
Read more -
June 4, 2020
Don’t use Covid-19 as a motivation to cross the privacy line
Read more -
May 27, 2020
3 factors for measuring the insider threat risk for your organization
Read more -
May 19, 2020
Protecting creativity – insiders threaten media and entertainment
Read more -
May 12, 2020
Covid-19 makes pharma a target for insider threats
Read more -
May 8, 2020
Remote employees create perfect storm for insider threats
Read more -
April 30, 2020
Top 3 security challenges for manufacturing
Read more -
April 24, 2020
How to quick start an insider threat program
Read more -
April 13, 2020
CISOs perspective on implementing a data safety net in times of crisis
Read more -
April 7, 2020
3 reasons why DLP fails to protect from insider threats
Read more -
April 1, 2020
Casb aren’t enough: how to protect your valuable intellectual property
Read more -
March 23, 2020
3 ways to drive innovation in security
Read more -
March 18, 2020
Why DLP is not for IP
Read more -
March 12, 2020
How to mitigate risks of data sprawl in your organization
Read more