The Threat From Within: Strategies to Defend Against a Growing Threat Vector
02/24/2022
Category: Research ReportThreat researchers continue to document a disturbing shift in the source of big, expensive data breaches from external attackers to insiders, and multiple studies have documented an increase in the percentage of data breaches attributed to insiders.
Analyst
EMA
Other Resources:
See All ResourcesResearch Report 06/10/2025
From Scripts to Platforms: Why Homegrown Tools Dominate Network Automation and How Vendors can Help
Do-it-yourself (DIY) network automation is everywhere. Regardless of what an enterprise does with th...Research Report 04/14/2025
Enterprise Strategies for Hybrid, Multi-Cloud Networks
This market research report explores how enterprises design, build, and operate hybrid, multi-cloud ...Featured 04/02/2025
Taking Observability to the Next Level: OpenTelemetry’s Emerging Role in IT Performance and Reliability
OpenTelemetry is one of the most widely adopted cloud native open source projects. It marks a signif...By Dan Twing
Research Report 03/03/2025
Adventuring Into Identity Threat Detection and Response – A Hero’s Journey
The EMA Research Report, Adventuring Into Identity Threat Detection and Response – A Hero’s Journey,...By Ken Buckler
Research Report 02/07/2025
The Future of Workload Automation and Orchestration: Driving Digital Transformation with Orchestration and Generative AI
Workload automation (WLA) evolved into a strategic enabler for modern enterprises, playing a dual ro...By Dan Twing
Research Report 01/30/2025
Network Observability: Managing Performance Across Hybrid Networks
Performance and availability are essential missions of any enterprise network infrastructure and ope...Research Report 12/13/2024
Unleashing AI-Driven IT Operations: Challenges, Opportunities, and Future Growth
In today’s rapidly evolving digital landscape, the integration of artificial intelligence (AI) into ...By Dan Twing
Research Report 11/26/2024
Zero Trust Networking: How Network Teams Support Cybersecurity
This market research examines how network infrastructure teams support enterprise zero trust securit...Research Report 08/30/2024
OpenTelemetry: Challenges, Priorities, Adoption Patterns, and Solutions
OpenTelemetry emerged as a key player in the cloud native arena, aiming to streamline the increasing...By Torsten Volk
Research Report 08/20/2024