Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

The Email Insider Threat Has Evolved in the Era of Generative AI

Seemingly harmless tools such as AI grammar checkers pose a number of intellectual property risks

By Dave Baggett, SVP and GM Security Suite
Email security
Techa Tungateja / iStock / Getty Images Plus via Getty Images
January 21, 2026

What’s scarier than a horde of threat actors constantly testing your defenses? The insider threat: rogues already operating within your defenses!

Every security practitioner knows about insider threats, but it’s worth reflecting on how this kind of attack has evolved, particularly in the age of generative AI. Let’s assess where we are as we head into 2026, with a focus on email security.

Email security has become the next critical challenge in cybersecurity, and for good reason: email was designed in 1971 with a fundamental flaw — it assumed everyone was a good actor. Case in point: you used to be able to send mail from president@whitehouse.gov without any verification. This trust-based architecture has created vulnerabilities that attackers continue to exploit today.

Historically the archetype insider threat is the disgruntled employee who intentionally sabotages internal infrastructure or mails hundreds of sensitive documents to their personal Gmail account. But this framing fails to account for two other major insider threats.

The first is APT-style code installed via malicious email attachment. Without adequate email security, emails with these payloads can get delivered to end users. Attackers using chatbots can now craft malicious emails with perfect grammar and industry-specific (or even recipient-specific) targeting in no time. The unsuspecting recipient opens the attachment, triggering malicious code that exploits a vulnerability in the application handling the file, giving the attacker access to their machine.

When attackers want to steal data, their malware can hijack a user's Outlook to automatically email sensitive files it finds on their computer. This "insider threat" doesn't involve any actual insider — just malicious code accidentally installed by an employee.

Modern malware can even use AI to scan files and identify valuable information like passwords or payroll data. Since it runs on the employee's own computer, it costs attackers nothing and can search undetected for weeks.

Another common attack uses malicious HTML email attachments. While Outlook blocks dangerous code in email bodies, when someone opens an HTML attachment, it launches in their web browser — where the code runs freely. This lets attackers create fake login pages that look identical to your company's real Microsoft 365 portal, complete with your branding. Employees who enter their credentials unknowingly send them straight to attackers.

While multifactor authentication helps, don't assume it makes you invulnerable — more sophisticated attacks can intercept text message codes too.

The solution? Deploy email security systems that analyze every attachment and understand JavaScript threats. Your vendor should clearly explain how their system addresses these risks, not just mention "AI."

The second major threat comes from browser extensions and Outlook plugins. While these tools can't install malicious programs, they can read your emails and send content to third-party services. That grammar checker or AI writing assistant? It might be using your sensitive business emails as training data for its AI models — and there's no reliable way to prevent AI from later revealing that training data.

Here's the irony: security vendors are rushing to add AI to their products. Your Data Loss Prevention system probably still uses outdated pattern-matching technology from the 1990s. As vendors upgrade to AI-powered systems, make sure you know which AI models they're using, who hosts them, and how your data is handled.

The traditional view of insider threats still applies; there may indeed be malevolent employees hoping to harm their employer through sabotage or data leakage. But attackers and LLMs have both changed the game.

We now need to think precisely about exactly where third-party code runs — in attachments, in HTML scripts, in third party services connected via browser and Outlook extensions. And we should expect our email security vendors to explain how they address these new exfiltration vectors.

As attackers evolve, so must our tools. And as LLMs become ubiquitous, vendors must solve the very difficult challenge of countering adversaries armed with human-level AI tools.

KEYWORDS: artificial intelligence (AI) email security insider risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

D baggett headshot 2026

Dave Baggett is SVP and GM Security Suite at Kaseya.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Rendered heart monitors

Cybersecurity Stagnation in Healthcare: The Hidden Financial Costs

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Casino machine

    How the cybersecurity threat landscape has changed and evolved in casinos

    See More
  • Business credit card behind lock

    Protecting financial institutions in the era of AI-driven threats

    See More
  • Doctor holding stethoscope

    Securing healthcare data in the era of AI

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing