I was listening to BBC news on my way back home from a recent trip down to Phoenix, Arizona when I heard of a specific episode that piqued my interest and reminded me of my personal experience before starting Revyz.
The broadcast detailed a chilling account from a BBC cyber correspondent who was directly propositioned by a criminal gang to help hack his own employer. The criminals offered him a cut of the ransom payment, claiming he "wouldn't need to work ever again" if he provided them with access to BBC systems. This direct attempt to leverage an insider for a malicious attack felt both surreal and deeply familiar. It reinforced a truth I've learned over two decades in data protection and security: the security perimeter is no longer the firewall; it's the person with a badge.
This experience brought me back to my own encounter with a potential insider threat. After my previous company was acquired, I discovered that our Jira roadmap was mysteriously changing on its own, with tickets being deleted. It was an eye-opening realization that even in our most critical business applications, a disgruntled or malicious insider could cause serious harm, and the data was simply gone forever. This personal incident, coupled with the rising tide of similar breaches, became the impetus for my co-founder and me to build our company, Revyz.
The cybersecurity landscape has fundamentally shifted, with insiders—authorized individuals—becoming one of the most persistent and costly threats to organizations. Insider threats exist on a complex spectrum, primarily differentiated by their intent.
The financial consequences of insider threats are severe and escalating. The average annual cost of managing and mitigating these threats reached a staggering
$17.4 million per organization in 2025. While negligent insiders account for the majority of incident volume, it is the compromised and malicious attacks that cause the highest financial damage. The average cost per incident for credential theft surged to nearly
$780,000 in 2025, and malicious incidents averaged over $715,000 per event.
A key reason for these high costs is
detection latency. The average time to contain an insider incident is a shocking 81 days. This prolonged "dwell time" gives actors ample opportunity to exfiltrate vast amounts of data. Incidents that take over 91 days to detect cost organizations an average of $18.7 million, proving that perimeter defenses are no longer sufficient.
Another common failure point is the lack of a strong
Principle of Least Privilege (PoLP). The Tesla data breach in May 2023 serves as a clear lesson on this. Two former employees were able to exfiltrate sensitive corporate data and the personal information of nearly 76,000 employees because they had overly broad access to systems. This incident demonstrated that granting wide-ranging access for the sake of "productivity" is a dangerous trap, which directly facilitates large-scale data theft upon an employee's departure.
The data from the past five years is conclusive: the threat from within is persistent, costly, and rapidly evolving. It's no longer just about external actors; it's about the people with legitimate access, both a blessing and a curse. This shift requires a new approach to cybersecurity that prioritizes privilege enforcement, real-time behavior analytics, and robust controls for the entire human lifecycle—from hiring to off-boarding. It is this exact problem—the need for a new way to secure critical corporate data from the inside out—that inspired the creation of Revyz.