December 8, 2025
This Week in Leaks: December 8, 2025

This Week in Leaks: Disclosures across defense, tech, government, and gaming

December 1, 2025
This Week in Leaks: December 1, 2025

Corporate communications, insider access information, game titles, and budget information all leaked

November 24, 2025
This Week in Leaks: November 24, 2025

Airline chaos, leaked memos, and AI regulations

November 17, 2025
This Week in Leaks: November 17, 2025

Leaked Nintendo Switch games, Meta ads, and executive messages sparked something new this week.

November 10, 2025
This Week in Leaks: November 10, 2025

This Week in Leaks: Inside Amazon, PlayStation, and the Pentagon

October 20, 2025
This Week in Leaks: October 20, 2025

Private chats, policy drafts & executive emails exposed... Insider leaks that shaped the week’s headlines — and how they happened.

October 13, 2025
This Week in Leaks: October 13, 2025

Private memos and texts revealed by insiders... Insider leaks that shaped the week’s headlines — and how they happened.

Man working in an observation room, looking at activity monitors.
June 13, 2025
From Crisis Management to Proactive Threat Prevention

Why watermarking is the future of insider risk management.

April 4, 2025
Breaking the Leak Doom Loop: How to Stop Insider Threats Before They Spiral

Information often travels faster than leadership can manage, especially when an internal crisis stirs discontent among employees. When sensitive data leaks from an organization from an insider, a self-feeding cycle of fear, reactionary measures, and erosion of trust can begin. This phenomenon, the leak doom loop, disrupts productivity, undermines confidence, and in some extreme cases jeopardizes the entire enterprise.

January 6, 2025
From Risk to Resilience: Addressing Insider Threats in Financial Services

Insider threats in finance pose significant risks to sensitive data, reputation, and can land institutions in hot water – but, there are proactive strategies like forensic watermarking, encryption, and real-time monitoring that can help protect sensitive information and prevent costly repercussions.

Subscribe for updates

Sign up for updates as we publish more.