Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Data Lineage?

In this video, we break down the concept of data lineage — a way to track how data moves, changes, and is used across your organization. Data lineage provides visibility into the lifecycle of sensitive information, from where it originates to where it flows, and who interacts with it. Understanding data lineage helps organizations improve security, ensure compliance, and reduce insider risk. Watch now to learn what data lineage is, why it matters, and how it helps protect your most valuable data.

The Data Volume & Visibility Crisis in Cybersecurity

Enterprises are drowning in data — and struggling to see what really matters. The explosion of data volume has created a visibility crisis that makes it harder than ever to protect sensitive information and stop insider threats. In this short video, we explain why traditional tools can’t keep up, what makes visibility so critical, and how organizations can regain control over their data. Watch now to learn.

How Cyberattacks Drive Customers Away (and Damage Trust)

A data breach doesn’t just cost money — it costs customers. Trust is hard to win and easy to lose, and cyberattacks often push loyal customers to walk away. In this short video, we explore how cyber incidents lead to customer churn, the hidden cost of lost trust, and why protecting sensitive data is critical to retaining your customer base. Watch now to learn: How cyberattacks impact customer trust and loyalty.

Why Legacy DLP Fails and What Cyberhaven Does Differently - Full Video

In this lightboard session, we break down how organizations classify and protect sensitive data—and why traditional methods fall short. You’ll see how Cyberhaven reimagines data security with lineage-based protection that works across files, systems, and formats. Watch to learn: The difference between data maps, tags, and labels The limitations of legacy classification (persistence & breadth)

What is Phishing?

What exactly is phishing—and how can you avoid falling for it? In this video, we break down phishing attacks in plain terms, from classic email scams to newer tactics like smishing, vishing, and even quishing (yes, phishing via QR code!). You’ll learn how to spot the warning signs, understand the real-world consequences of falling for a phishing attempt, and discover simple yet powerful ways to protect yourself and your organization.

What is an Insider Threat?

Insider threats are one of the most underestimated cybersecurity risks facing organizations today—and they’re coming from the inside. In this video, we break down exactly what insider threats are, the different types (including malicious, negligent, and compromised insiders), and why they’re so hard to detect. You’ll also hear about real-world examples like Edward Snowden and the Capital One breach, and learn how businesses can protect themselves with practical, real-world strategies.

What are False Positives?

What are false positives in cybersecurity — and why do they matter? In this video, we break down the concept of false positives: those annoying alerts that cry wolf when there’s no real threat. You’ll learn how they happen, the difference between false positives and false negatives, and the hidden costs they create for security teams. We’ll also walk through real-world examples, explore how false positives impact SOC efficiency, and share practical strategies to reduce them using better configurations, machine learning, and smarter alert triage.

What is Data Loss Prevention (DLP)?

What is DLP, and why is it critical to modern cybersecurity? In this video, we break down Data Loss Prevention—also known as DLP—into simple terms. You'll learn how DLP works, what kinds of sensitive data it protects, and why organizations use it to prevent data leaks, insider threats, and accidental exposure of confidential information. Whether you're new to data security or looking to level up your InfoSec knowledge, this is the perfect starting point to understand how DLP fits into your broader cybersecurity strategy.

Breaking Free from Legacy DLP - A Fireside Chat with Zebra Technologies

In this candid fireside chat, we’ll explore why legacy DLP is no longer fit for purpose and what a modern, behavior-aware approach looks like. Join us as we unpack the technical and cultural debt holding security teams back, how new paradigms like contextual visibility and real-time decisioning are enabling faster, more effective responses. Matt Webb, Sr. Manager of Information Security at Zebra Technologies, shares his first-hand experience of making the switch to modern DLP with Cyberhaven.