INSIDER RISK INSIGHTS, NEWS, AND ANALYSIS
BLOG
![Insider Risk Insights - DTEX Blog](https://www.dtexsystems.com/wp-content/uploads/2021/02/DTEX_website_imagesBlog_Hero.jpg)
The Latest Insider Risk Insights
![How DTEX is Supporting National Security](https://www.dtexsystems.com/wp-content/uploads/2024/06/Mission-Possible-How-DTEX-is-Supporting-National-Security-from-the-Inside-Out-1-scaled.jpeg)
"Mission Possible": How DTEX is Supporting National Security from the Inside Out
When considering the most significant cyber threats to the public sector, many immediately think of foreign adversaries breaching federal agencies.
Read More![](https://www.dtexsystems.com/wp-content/uploads/2024/04/DTEX_Banners_Insider-Risk-Report_r2_1200x627_opt2-1.png)
Countering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read More![THREAT ADVISORY FOR DISRUPTING FOREIGN INTERFERENCE](https://www.dtexsystems.com/wp-content/uploads/2024/07/THREAT-ADVISORY-FOR-DISRUPTING-FOREIGN-INTERFERENCE-scaled.jpeg)
DTEX i³ Issues New Threat Advisory for Disrupting Foreign Interference
The DTEX Insider Intelligence and Investigations (i3) team has released a new threat advisory to help organizations detect, deter,…
Read More![The Importance of HR Data in your Insider Risk Management Program](https://www.dtexsystems.com/wp-content/uploads/2024/06/The-Importance-of-HR-Data-in-your-Insider-Risk-Management-Program.jpeg)
The Value of HR in Your Insider Risk Management Program
Companies hire people, and while every one of those individuals presents a potential risk, not all (hopefully none) will manifest…
Read More![Foreign Interference Case Study](https://www.dtexsystems.com/wp-content/uploads/2024/06/Foreign-Interference-Case-Study.png)
How Behavioral Intelligence Can Combat Foreign Interference
Foreign interference is arguably the biggest threat facing national security today, as adversaries increasingly weaponize insiders to advance their strategic…
Read More![How DTEX is Supporting National Security](https://www.dtexsystems.com/wp-content/uploads/2024/06/Mission-Possible-How-DTEX-is-Supporting-National-Security-from-the-Inside-Out-1-scaled.jpeg)
"Mission Possible": How DTEX is Supporting National Security from the Inside Out
When considering the most significant cyber threats to the public sector, many immediately think of foreign adversaries breaching federal agencies.
Read More![Mitigating Third-Party Zoom Risk](https://www.dtexsystems.com/wp-content/uploads/2024/06/Mitigating-Third-Party-Zoom-Risk-scaled.jpeg)
DTEX i³ Issues Threat Advisory for Mitigating Third-Party Zoom Risk
Video conferencing applications like Zoom have become ubiquitous with the remote workforce, but they can also introduce a new vector…
Read More![](https://www.dtexsystems.com/wp-content/uploads/2024/05/GenAI-security-policies-scaled-1.jpg)
You Know You Need GenAI Policies, Right?
AI (Artificial Intelligence) has been dominating the news, even more than data breaches. It is most certainly an exciting time…
Read More![The Rise of AI and Blended Attacks Key Takeaways from 2024 RSAC](https://www.dtexsystems.com/wp-content/uploads/2024/05/The-Rise-of-AI-and-Blended-Attacks-Key-Takeaways-from-2024-RSAC-scaled.jpeg)
The Rise of AI and Blended Attacks: Key Takeaways from RSAC 2024
The 2024 RSA Conference can be summed up in two letters: AI. AI was everywhere. It was the main topic…
Read More![User Behavior Analytics Why False Positives are NOT the Problem](https://www.dtexsystems.com/wp-content/uploads/2024/05/User-Behavior-Analytics-Why-False-Positives-are-NOT-the-Problem-scaled.jpeg)
User Behavior Analytics: Why False Positives are NOT the Problem
The axiom “garbage in, garbage out” has been around since the early days of computer science and remains apropos today…
Read More![DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse](https://www.dtexsystems.com/wp-content/uploads/2024/04/DTEX-i3-Threat-Advisory-Provides-Detections-for-LOTL-C2-Abuse-scaled.jpeg)
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read More![Potential Risk Indicator Decay and Insider Risk Management](https://www.dtexsystems.com/wp-content/uploads/2024/04/Potential-Risk-Indicator-Decay-and-Insider-Risk-Management-scaled.jpeg)
Potential Risk Indicator Decay and Insider Risk Management
Who among us hasn’t received an answer to what we thought was a precise question with, “it depends” and our…
Read More![](https://www.dtexsystems.com/wp-content/uploads/2024/04/DTEX_Banners_Insider-Risk-Report_r2_1200x627_opt2-1.png)
Countering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read More![Insider Threat Summit (ITS8) 2024 Three Takeaways](https://www.dtexsystems.com/wp-content/uploads/2024/04/Insider-Threat-Summit-ITS8-2024-Three-Takeaways-scaled.jpeg)
Insider Threat Summit (ITS8) 2024: Three Takeaways
The 8th Annual Insider Threat Summit (ITS) wrapped up last week in Monterey, California, and once again…
Read More