The Threat From Within: Strategies to Defend Against a Growing Threat Vector
02/24/2022
Category: Research ReportThreat researchers continue to document a disturbing shift in the source of big, expensive data breaches from external attackers to insiders, and multiple studies have documented an increase in the percentage of data breaches attributed to insiders.
Analyst

EMA
Other Resources:
See All Resources
Research Report 01/21/2026
AI-Driven NetOps: How Enterprises are Embracing Intelligent Network Management Solutions: Summary
This is the research summary for EMA’s recent report, “AI-Driven NetOps: How Enterprises are Embraci...
Research Report 01/16/2026
AI-Driven NetOps: How Enterprises are Embracing Intelligent Network Management Solutions
This market research explores how IT organizations plan to use artificial intelligence to optimize, ...
Research Report 12/08/2025
The Network Source of Truth: How Engineering Teams Establish and Use These Critical Tools
Over the last decade, a new class of management tool, the network source of truth (NSoT), slowly eme...
Featured 11/24/2025
Redefining Modern Service Management: ServiceOps, ESM, and the Rise of AI-Powered Services
Discover how IT service delivery is shifting from reactive support to a predictive, intelligence-dri...
Research Report 11/05/2025
AI in DevOps: Adoption Outpaces Governance as Developer Role Evolves
AI is transforming software development from the inside out. Developers are using AI-powered assista...By Dan Twing

Research Report 10/02/2025
Enterprises Embrace AI-Driven Wi-Fi to Meet Today’s Network Demands
Enterprises are changing the way they use Wi-Fi networks, and that change is kicking off a wave of i...
Research Report 09/08/2025
Modernizing Mainframe Applications: Strategies, Tools, and Insights for a Digital Future
Mainframe modernization has become a critical priority for organizations navigating the challenges o...By Dan Twing

Research Report 09/05/2025
The Network Observability Maturity Model: How to Plan for NetOps Excellence
Given the critical role that network observability tools play, network team must strive for best-in-...
Research Report 08/11/2025
Cloud Network Traffic Data: Empowering Network and Security Operations in the Hybrid, Multi-Cloud Era
This research, based on a survey of 250 enterprise IT and cybersecurity personnel, explores how ente...
Research Report 07/22/2025
