Read about our momentum
Home

Site index

Compilation of all URLs present and accessible in cyberhaven.com

Resources

2025 AI Adoption and Risk Report | Cyberhaven Labs2026 AI Adoption & Risk Report | AI Security Data | Cyberhaven LabsA Practical Guide to Modern DSPMAI and Enterprise Risk ManagementAI Data Security Solution BriefCASB Buyer's Guide: Cloud Security SolutionsChatGPT at Work: Enterprise AI Usage ReportCISO Series: Balancing Innovation and SecurityCISO Series: Building CISO-CIO PartnershipsCISO Series: Decoding Cybersecurity LanguageCISO Series: Navigating Shadow AI RisksCMMC Compliance Solution BriefCooley: Data Classification for Law FirmsCyberhaven and Microsoft Purview IntegrationCyberhaven Data Security Platform OverviewData Lineage: Next-Gen Data Security GuideData Loss Prevention Solution BriefData Security for HealthcareData Security for Investment ManagementData Security for Law FirmsData Security for Technology CompaniesData Security ReimaginedDemystifying DLP: Modern Data Loss PreventionDeploy DLP in 90 Days: Implementation ChecklistDLP Buyer's Guide: How to Choose DLP SoftwareDLP for Dummies: Data Loss Prevention GuideDLP Program Blueprint: Data Protection GuideHarnessing AI Safely in the EnterpriseInsider Risk Management Solution BriefInsider Risk Report: The Great Data HeistIntroduction to Data Detection and ResponseIron Mountain: Enterprise Data SecurityIVP: Protecting Investment DataResource Library: Insider Risk & AI SecurityNavan: Insider Risk Management SuccessO'Reilly Guide to Proactive Data SecurityThe Broken Perimeter: Insider Risk Management GuideTop 15 Data Detection and Response Use CasesQ1 2024 Insider Risk ReportQ2 2024 Insider Risk ReportThe DLP Disconnect - Why Legacy DLP Investment FailsSecuring the AI Frontier: Enterprise AI SecurityNavigating Security for AI: View from the Front LinesUp-Leveling Data Classification with LineageVaxCare: Healthcare Data Protection

Blog

Browser Agent Security Risk – ChatGPT Atlas Corporate Adoption TrendsEndpoint AI Agents Don't Ask PermissionEffortless Data Security: From Discovery to Enforcement on a Single PlatformDSPM vs. DLP: Choosing the Right Data Security StrategyDSPM vs CSPM: Understanding the DifferencesDSPM vs CSPM: Choose Your Cloud Security StrategyDSPM for the Modern Enterprise: One Unified View of Data Risk EverywhereDSPM for AI: Securing Data in the Age of Artificial IntelligenceDSPM and Data Discovery: Finding and Classifying Sensitive Data at ScaleDon't be fooled: data security requires global data lineageDoes CrowdStrike Specialize in Data Loss Prevention?DLP Compliance Guide: Meeting HIPAA, GDPR, and PCI RequirementsData Security Innovator: Arlan McMillan, CSO, Kirkland and EllisData Security Innovator: Mike Santos, Head of Security at CooleyData Security Posture ManagementDetecting and Stopping Data Exfiltration in Real TimeEnhancing Cyberhaven Data Loss Prevention with Exact Data MatchFinding Unexpected Security Gems With DDRFireside Chat: Breaking Free from Legacy DLPFormer Okta CIO Mark Settle on how CISOs and CIOs can better work togetherFrom Compliance to Cyber Resilience: The Real-World Benefits of DLPFrom Shadow IT to Shadow Data: The New Frontier in DLPFull Context Incident ResponseHow DSPM Works: A Practical Guide for Modern Data Security TeamsHow Generative AI is Changing the DLP LandscapeHow Legacy DLP Leaves You ExposedHow to Build an Effective Insider Risk Management ProgramHow to mitigate risks of data sprawl in your organizationHow to protect company data when preparing for a layoffImprove security with instant feedback: policies with notificationsInsider Threat Detection: IRM Strategies and SolutionsInsider Threats in the Age of AI: What Security Teams Need to KnowIntroducing Cyberhaven's Full Context BlockingIntroducing Linea AI: A revolutionary AI-first approach to data securityIntroduction to cloud access security brokers (CASB)IRM in the Real World: Why Culture Is Just as Important as ControlsIs Your Organization DLP-Mature? Here's How to Find OutJanuary product update: New gifts for the new yearKey takeaways from the 2024 Gartner Strategic Roadmap for World-Class Security of Unstructured DataKheun Chan, Principal Security Architect at Iron MountainLearn About Insider Risk, AI Security and Data ProtectionLineage Over Labels: A Better Way to Protect DataManaging Shadow AI: Best Practices For Enterprise SecurityModern Data Security: How DLP and IRM Together Prevent Insider ThreatsNavigating the FTC's Non-Compete Ban: A Guide for Information Security TeamsOne platform, complete protection: why data security is moving on from point solutionsProactive insider risk management with CyberhavenPure-Play DSPM Vendors: What's their second act?Redefining Data Security: From Insight to ActionReflecting on a momentous year at Cyberhaven and looking ahead to 2024Reimagining Data Security: Four New Capabilities That Make Protection SmarterSEC Slams Wall Street Banks with $1.8 Billion in FinesSecure employee offboarding isn't happening fast enoughSecuring Source Code Requires Securing the Commit and a Whole Lot MoreSecurity for AI: enabling secure AI adoption across the enterpriseSensitive Enterprise Data Is Flowing Into AI Tools at ScaleShadow AI and the New Data Defense ParadigmShadow AI: how employees are leading the charge in AI adoptionShield your acquisitions: security strategies for the 2024 M&A marketThe Hidden Risk in Enterprise AI, and the Smarter Way to Safeguard DataThe Next Chapter in Cyberhaven's JourneyThe ROI of Modern DLP Solutions: Why It's Worth the InvestmentThe Top 10 DSPM Software Products of 2024The Top 10 SASE Solutions of 2024The Top 10 UEBA products of 2024The Top 5 Code42 Incydr Alternatives and Competitors 2024The Top 5 Proofpoint Insider Threat Alternatives 2024The Top Insider Threat Software Products of 202411% of data employees paste into ChatGPT is confidentialA New Data Age Demands A New Way of Thinking About DSPMAchieving Data Confidence: Mission Australia Strengthens Data Protection with CyberhavenAI Is the Future of DLP — Here's What That Actually MeansAI Security Webinar: 2026 AI Adoption and Risk Report InsightsAI Usage at Work Is Exploding But 71% of Tools Put Your Data at RiskAI-orchestrated espionage is here. Your data controls decide what happens next.America's AI Action plan: 3 key takeaways for data security leadersAn Overview of Microsoft Purview for Office 365 DLPAnatomy of an Insider Threat Investigation: From Alert to RemediationAutomatic visibility: the key to a more proactive data security programBest Digital Guardian DLP Alternatives and CompetitorsBest Trellix DLP Alternatives and Competitors in 2026Breaking silos: How to align GRC, cybersecurity, and privacy teamsBrowser Agent Security Risk: ChatGPT Atlas Corporate Adoption TrendsHow AI Companies Can Use Data Lineage To Stop IP TheftCASBs aren't enough: How to protect your valuable intellectual propertyCelebrating Cyberhaven's $33M Series B Funding RoundHow CISOs can justify their cybersecurity budgetHow Cyberhaven and Jamf Partner to Deliver Unmatched Data SecurityHow Cyberhaven Uses Data Lineage to Revolutionize DLPHow Data Lineage Improves Data Labeling and ClassificationHow DSPM Solves Critical Data Governance ChallengesHow DSPM Works: A Practical Guide for Modern Data Security TeamsSmarter than ever: Linea AI's next leap forward in data securityThe 10 Most Common Forms of Company Data Employees Steal or ExposeThe Best Data Loss Prevention (DLP) for macOSThe Biggest Insider Risk Gaps You Probably Haven't Thought AboutThe cubicle culprits: in-office employees leading corporate data exfiltrationThe essential requirements checklist for insider threat solutionsThe Evolution of Data Loss Prevention: From Perimeter to Insider RiskThe file and SaaS data perimeter is broken: data security needs data lineageThe Hidden Costs of False Positives in DLPTime To ValueTop 10 Cloud Access Security Broker (CASB) Solutions for 2025Top 9 Cyera Alternatives for DSPM in 2026Top Data Loss Prevention Solutions and Providers (2026)Top Five DTEX Alternatives: Insider Threat and DLP ComparedTop Forcepoint DLP Competitors and AlternativesTop IP theft statistics and stories in 2024Top Symantec DLP Alternatives and CompetitorsTop Ten Data Security Trends To Prepare For in 2026Top Varonis DSPM Alternatives in 2026Types of Insider ThreatsWhat Every CISO Should Know About How DLP Actually WorksWhat happened to the Gartner DLP Magic Quadrant?What is Data Detection and Response (DDR)?Why Cyberhaven is the only day-zero DLP solution for macOS Big SurWhy data security needs a platform: what DSPM and DLP acquisitions tell usWhy Data, Not the Perimeter, Should Be the Core of Your Security StrategyWhy Endpoint DLP Agents Are Critical for Modern Data SecurityWhy Fragmented AI Adoption Poses a Major Data RiskWhy Insider Risk Management Needs to be Proactive Not ReactiveWhy Insider Threat Risk Grows When Moving to the CloudWhy Legacy DLP Fails: Modern Data Protection ChallengesWhy Traditional DLP Fails in the Age of Cloud and CollaborationZack Willis and Michael Traski at IVP on enabling the businessComplete Data Exfiltration Protection in One SolutionData Flow Visibility and Lineage Tracking PlatformDetect and Stop Insider Threats in Real TimeFaster Incident Response with Complete Data HistoryAllow Web Access Without Risking Data LeaksBlock Data Exfiltration via USB and Storage DevicesControl Print Exfiltration in Office and RemoteSecure AI Adoption with Visibility and ControlSecure Email Without Gateway OverheadStop Data Leaks to Personal Cloud AccountsCyberhaven vs Code42 - Data Security ComparisonCyberhaven vs CrowdStrike Falcon Data ProtectionCyberhaven vs DTEX - Data Security ComparisonCyberhaven vs Symantec DLP - Feature ComparisonDLP Comparison - Cyberhaven vs Legacy SolutionsEnhance Microsoft Purview with CyberhavenNavan: Insider Risk Management SuccessCISO Series Digest: Adam Shostack on Decoding Cybersecurity LanguageCISO Series Digest: Prabhath Karanth on DLP Program SuccessComplete Guide to Understanding CMMC ComplianceCrying wolf: the challenge of alert fatigueCyberhaven is a 2023 Gartner Cool Vendor in Data SecurityCyberhaven Product Update: May 2022Cyberhaven Product Update: November 2021Cyberhaven Product Update: October 2021Chris Payne, VP of Information Security, VaxCareData loss prevention risk assessmentGartner's latest DSPM reportHow cert pinning and E2EE broke your CASBWhat Every CISO Should Know About How DLP Actually WorksBuilding a Robust Insider Threat ProgramCyberhaven DSPM: Uniting DSPM and DLP to Secure DataWhy I Joined Cyberhaven | Iulia Stefoi-Silver

Newsroom

Newsroom: Press Releases, Articles & Media Kit

Press Releases

AI 101: When and how To properly use AI At Work Without Putting your employer's Data at riskAs Enterprise AI Use Deepens, New Research Highlights the Urgent Need for Data GovernanceCyberhaven Addresses Critical AI Security Gap with New Visibility and Protection PlatformCyberhaven Announces Accelerating Customer Adoption and Appoints Key Leadership to Drive Next Phase of GrowthCyberhaven Announces First-Ever Data Defense Forum to Help Organizations Protect Data in the AI EraCyberhaven Announces Record Year of Growth as Enterprises Race to Secure AI and DataCyberhaven closes $13 million Series A round, unveils data behavior analytics solutionCyberhaven Expands Leadership Team with Key Industry ExecutivesCyberhaven Introduces Data Security Posture ManagementCyberhaven Labs Reports 24% of Enterprises Have Installed ChatGPT Atlas: New “Agentic Browser” Poses Emerging Security Risks.Cyberhaven Launches Unified AI & Data Security Platform for the AI EraCyberhaven Named to Built In’s 2026 Best Places to Work ListsCyberhaven Named to Redpoint's InfraRed 100 for Third Consecutive YearCyberhaven Names James McCarthy SVP of Sales to Meet Growing Demand for Data Security SolutionsCyberhaven Raises $100 Million Series D at $1 Billion ValuationCyberhaven Raises $33M in Series B Funding to Transform Stagnant and Ineffective Data Protection MarketCyberhaven Raises $88 Million to Protect Enterprise Data in the AI EconomyCyberhaven Ranked Among the Fastest-Growing Companies in North America on the 2025 Deloitte Technology Fast 500™Cyberhaven Report: Majority of Corporate AI Tools Present Critical Data Security RisksCyberhaven Survey: lack of awareness, cloud app usage, and remote workers create perfect storm for insider attacksCyberhaven Transforms Enterprise Data Security with Reimagined DLP and Insider Threat PlatformCyberhaven Unveils First Autonomous AI Agent to Halt Corporate Data LeaksCyberhaven Unveils First Insider Threat Product That Prevents Data Leaks in Real TimeCyberhaven Unveils Full Context BlockingCyberhaven Welcomes Accomplished Cybersecurity Officer Aman SirohiCyberhaven wins 2020 Fortress Cyber Security Award for data protectionCyberhaven wins cyber defense magazine infosec awards at RSA conference 2020