WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Proactive Insider Risk Management | A Case for Technology Consolidation
It is often said that any insider risk program must have a technology component to be effective in today’s enterprise…
Read More
2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration
Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…
Read More
Insider Risk vs. Insider Threat: What's the Difference?
Earlier this year we published our 2023 Insider Risk Investigations Report and took care to ask the question, what…
Read More
Preventing Insider Threats in Pharma: Case Study
Preventing insider threats in the pharmaceutical industry is no small feat. As providers of life-changing medicines, pharmaceutical companies must…
Read More
A Communications Framework for Insider Risk Management
The Insider Risk Management (IRM) world is filled with buzzwords. Phrases like “insider threat”, “the human element”, “zero trust” and…
Read More
Proactive Insider Risk Management | A Case for Technology Consolidation
It is often said that any insider risk program must have a technology component to be effective in today’s enterprise…
Read More
Insider Risk Resolution: A Decision Tree Framework
Data loss from employees is an increasing concern for enterprise organizations and federal entities. Findings from the DTEX i3…
Read More
DTEX Insider Risk Assessment Development Strategy for Partners
DTEX offers partners an opportunity to provide insider risk management services to customers with an easy assessment to get started.
Read More
Closing the Trust-Risk Loop with File Lineage
The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike…
Read More
Insider Risk Detection 101: Mitigating Unintentional Insider Threats
When most people think of the insider threat, they think of that picture-perfect stock image of a man in a…
Read More
7 Reasons to Ditch Endpoint DLP for Endpoint Visibility
Companies really don't have any business collecting or managing.
Read More
DTEX Named “Most Comprehensive Insider Threat Prevention” in Global InfoSec Awards
We are thrilled to kick off the 2023 RSA Conference with two award wins from Cyber Defense Magazine (CDM): Most…
Read More
Busted: Misconceptions on Insider Risk Programs
Insider risk management is gaining momentum, as organizations increasingly accept that cybersecurity is a human challenge that requires a human…
Read More
DTEX integrations for Insider Risk Management: Splunk and CrowdStrike
Integrations are critical for efficient and effective insider risk management. This might sound like a simple statement, but there is…
Read More