Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PurePlay DSPM Vendors: What's their second act?

CSPM tools thrived by making cloud posture issues easy to find, but posture alone didn’t stop breaches. The market evolved into CNAPP – uniting posture, runtime, identity, and shift‑left – to deliver protection, not just visibility. DSPM is on the same trajectory: discovery and classification at rest are necessary but insufficient, especially as AI fragments data into shareable snippets that evade label‑centric controls.

What Every CISO Should Know About How DLP Actually Works

For most CISOs, data loss prevention (DLP) has long been a familiar acronym. It’s a category of security technology that has been around for more than a decade, often associated with compliance and the need to keep regulated data under control. Yet while the concept sounds straightforward—preventing sensitive data from leaving the organization—the reality is that modern DLP platforms are far more sophisticated than their early predecessors.

What is Data Lineage?

In this video, we break down the concept of data lineage — a way to track how data moves, changes, and is used across your organization. Data lineage provides visibility into the lifecycle of sensitive information, from where it originates to where it flows, and who interacts with it. Understanding data lineage helps organizations improve security, ensure compliance, and reduce insider risk. Watch now to learn what data lineage is, why it matters, and how it helps protect your most valuable data.

The Hidden Risk in Enterprise AI, and the Smarter Way to Safeguard Data

AI exploded into the workplace overnight, reshaping how we work. Today, nearly every employee is experimenting with tools to move faster and think bigger. However, that acceleration comes with risk. According to Cyberhaven Labs’ latest research, nearly three-quarters of AI apps in use pose high or critical risks, and only 16% of enterprise data sent to AI ends up in enterprise-ready apps. The rest flows to personal or unvetted tools.

Insider Risk vs Insider Threat: What's the Difference?

In this video, we break down these two important but often-confused terms in cybersecurity. Insider risk refers to the potential for harm that comes from employees, contractors, or partners who have access to sensitive data — whether accidental or intentional. Insider threat is when that risk becomes an actual malicious or negligent action that puts your organization at risk.

What is Insider Risk Management?

In this video, we explain the basics of insider risk management — the practice of identifying, assessing, and reducing the risks that come from employees, contractors, or partners who have access to sensitive data. Insider risk management goes beyond traditional data loss prevention by addressing both malicious and accidental insider threats. From protecting intellectual property to preventing data leaks, insider risk management helps organizations secure their most valuable information.

Why Legacy Data Loss Prevention (DLP) Fails: Insights from Cyberhaven's VP of Sales Engineering, John Loya

Confronted with a rise in sensitive data breaches, businesses are under pressure to efficiently protect their information while overcoming myriad technical limitations. In a recent video, Jon Loya, VP of Sales Engineering at Cyberhaven, shared valuable insights on the challenges of data loss prevention (DLP) and introduced Cyberhaven's cutting-edge strategies for tracking sensitive data within organizations.

The Data Volume & Visibility Crisis in Cybersecurity

Enterprises are drowning in data — and struggling to see what really matters. The explosion of data volume has created a visibility crisis that makes it harder than ever to protect sensitive information and stop insider threats. In this short video, we explain why traditional tools can’t keep up, what makes visibility so critical, and how organizations can regain control over their data. Watch now to learn.

How Cyberattacks Drive Customers Away (and Damage Trust)

A data breach doesn’t just cost money — it costs customers. Trust is hard to win and easy to lose, and cyberattacks often push loyal customers to walk away. In this short video, we explore how cyber incidents lead to customer churn, the hidden cost of lost trust, and why protecting sensitive data is critical to retaining your customer base. Watch now to learn: How cyberattacks impact customer trust and loyalty.