Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Phishing?

What exactly is phishing—and how can you avoid falling for it? In this video, we break down phishing attacks in plain terms, from classic email scams to newer tactics like smishing, vishing, and even quishing (yes, phishing via QR code!). You’ll learn how to spot the warning signs, understand the real-world consequences of falling for a phishing attempt, and discover simple yet powerful ways to protect yourself and your organization.

What is an Insider Threat?

Insider threats are one of the most underestimated cybersecurity risks facing organizations today—and they’re coming from the inside. In this video, we break down exactly what insider threats are, the different types (including malicious, negligent, and compromised insiders), and why they’re so hard to detect. You’ll also hear about real-world examples like Edward Snowden and the Capital One breach, and learn how businesses can protect themselves with practical, real-world strategies.

What are False Positives?

What are false positives in cybersecurity — and why do they matter? In this video, we break down the concept of false positives: those annoying alerts that cry wolf when there’s no real threat. You’ll learn how they happen, the difference between false positives and false negatives, and the hidden costs they create for security teams. We’ll also walk through real-world examples, explore how false positives impact SOC efficiency, and share practical strategies to reduce them using better configurations, machine learning, and smarter alert triage.

Reimagining Data Security: Four New Capabilities That Make Protection Smarter, Faster, and Easier

Enterprise data has become nomadic. What once lived safely behind corporate firewalls now travels across dozens of cloud applications, gets copied into collaborative documents, flows through AI tools, and transforms as employees work from coffee shops, home offices, and airport lounges.

America's AI Action plan has arrived: 3 key takeaways that data security leaders need to know

On July 23rd, the White House released America’s AI Action Plan, a sweeping federal strategy to drive U.S. leadership in artificial intelligence. The message was loud and clear: AI is a national imperative. The plan calls for removing regulatory barriers, investing in infrastructure, and accelerating AI adoption across commercial and government sectors. For data security leaders, this signals a pivotal shift.

What is Data Loss Prevention (DLP)?

What is DLP, and why is it critical to modern cybersecurity? In this video, we break down Data Loss Prevention—also known as DLP—into simple terms. You'll learn how DLP works, what kinds of sensitive data it protects, and why organizations use it to prevent data leaks, insider threats, and accidental exposure of confidential information. Whether you're new to data security or looking to level up your InfoSec knowledge, this is the perfect starting point to understand how DLP fits into your broader cybersecurity strategy.

Fireside Chat: Breaking Free from Legacy DLP

There’s a silent frustration building inside security teams today. It’s the fatigue of defending critical data with tools that can’t keep up. The friction of investigating endless false positives. The anxiety of not knowing what sensitive data is actually doing across your environment. And the sinking realization that despite massive investments, DLP tools are failing at the one thing they were designed to do–prevent data loss.

Breaking Free from Legacy DLP - A Fireside Chat with Zebra Technologies

In this candid fireside chat, we’ll explore why legacy DLP is no longer fit for purpose and what a modern, behavior-aware approach looks like. Join us as we unpack the technical and cultural debt holding security teams back, how new paradigms like contextual visibility and real-time decisioning are enabling faster, more effective responses. Matt Webb, Sr. Manager of Information Security at Zebra Technologies, shares his first-hand experience of making the switch to modern DLP with Cyberhaven.

How Legacy DLP Leaves You Exposed

Legacy DLP tools are blind to how data moves in today’s cloud-first world—leaving gaps attackers exploit. From shadow IT and SaaS sprawl to insider threats and misused personal devices, outdated solutions miss the subtle, high-risk behaviors that matter most. True protection requires context-aware visibility, behavioral insight, and data lineage that follows sensitive information everywhere it goes—not just where it started.

Why Legacy DLP Fails: The Hidden Data Risks You Can't See

Legacy data loss prevention (DLP) tools were built for a different era—a time when data sat safely behind firewalls and security meant scanning files for keywords. But today, data moves across cloud apps, personal devices, and collaboration tools faster than ever. Legacy DLP simply can’t keep up. In this video, we break down: If your organization is still relying on outdated DLP systems, it’s time to evolve. Because what your tools can’t see will hurt you.