October 20, 2025
This Week in Leaks: October 20, 2025

Private chats, policy drafts & executive emails exposed... Insider leaks that shaped the week’s headlines — and how they happened.

October 13, 2025
This Week in Leaks: October 13, 2025

Private memos and texts revealed by insiders... Insider leaks that shaped the week’s headlines — and how they happened.

October 6, 2025
This Week in Leaks: October 6, 2025

This Week in Leaks: From boardrooms to inboxes. DOE contracts, tax hikes, apology emails — and how they leaked.

September 29, 2025
This Week in Leaks: September 29, 2025

This Week in Leaks: Job specs, procurement plans, and insider emails.

September 5, 2025
This Week in Leaks: September 5, 2025

Why do insider risks remain one of the most persistent security challenges? Special NITAM edition.

August 29, 2025
This Week in Leaks: August 29, 2025

From leaked salaries to unreleased films, this week’s leaks show just how widespread insider risks can be. Here’s what made headlines:

August 22, 2025
This Week in Leaks: August 22, 2025

This Week in Leaks: What recent insider leaks could mean for you...

August 15, 2025
This Week in Leaks: August 15, 2025

Another week, another wave of insider leaks. From stolen chip designs to classified military data, here are 5 leaks that made headlines this week. The U.S. Army soldier tried leaking Abrams tank details — TSMC employees accused of stealing 2 nm chip secrets — Confidential U.S. government documents exposed — DHS memo on military-backed deportations leaked — Insider revealed North Korean IT infiltration schemes.

April 4, 2025
Breaking the Leak Doom Loop: How to Stop Insider Threats Before They Spiral

Information often travels faster than leadership can manage, especially when an internal crisis stirs discontent among employees. When sensitive data leaks from an organization from an insider, a self-feeding cycle of fear, reactionary measures, and erosion of trust can begin. This phenomenon, the leak doom loop, disrupts productivity, undermines confidence, and in some extreme cases jeopardizes the entire enterprise.

November 25, 2024
Data Security: Understanding the Differences and Preventive Measures for Data Exfiltration, Data Theft, and Data Leaks

Safeguarding sensitive information is not optional; it's necessary, and expected. For organizations of any size (and individuals for that matter), data security is foundational to maintaining trust, protecting intellectual property, and ensuring compliance with auditing and regulation standards. Among the many risks in data security, three terms often appear: data exfiltration, data theft, and data leaks. While each involves the unauthorized release of information, they have unique characteristics and implications for an organization's security strategy. Let’s clearly define the differences, explore the causes, and outline preventive strategies using data monitoring, leak prevention, deterrence, and mitigation.

Subscribe for updates

Sign up for updates as we publish more.