WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

May 5, 2022 | Jonathan Daly

Insider Risk Management or Insider Threat Surveillance?

The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…

Read More

February 8, 2022 | Rajan Koo

2022 Insider Risk Report ~ The Rise of the Super Malicious Insider

Earlier today we published our 2022 Insider Risk Report, our fifth consecutive since 2017. The purpose of our reports…

Read More

May 20, 2022 | Jonathan Daly

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 1)

Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While…

Read More

May 17, 2022 | Jonathan Daly

Why Scalability is a Must Have for Insider Risk Management

This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…

Read More

May 5, 2022 | Jonathan Daly

Insider Risk Management or Insider Threat Surveillance?

The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…

Read More

April 28, 2022 | Jonathan Daly

A New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare

Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…

Read More

April 7, 2022 | Armaan Mahbod

DTEX i3 Team Q&A: The Super Malicious Insider

Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…

Read More

February 3, 2022 | Jonathan Daly

Compliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring

Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…

Read More

January 25, 2022 | Jonathan Daly

DTEX Winter Virtual Briefing Series Presents Insider Risk Trends and Solutions

As cybersecurity trends develop for 2022, there continues to be a myriad of topics to focus on and things…

Read More

January 18, 2022 | Jonathan Daly

Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors

Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…

Read More

November 22, 2021 | Rajan Koo

DTEX Systems Offers NGAV Customers Access to Behavioral DLP & Human Forensic Telemetry via the CrowdStrike Falcon Platform

If the last 20+ years of cyberattacks have taught us anything, it is that humans are both an enterprise’s greatest…

Read More

November 19, 2021 | Jonathan Daly

Getting DLP Right: Considering Gartner’s Thoughts on the Four Elements of a Successful DLP Program

The DLP struggle is real according to Andrew Bales, Associate Principal Analyst with Gartner. So real in fact…

Read More

November 16, 2021 | Jonathan Daly

Top Challenges to Managing Insider Threats

In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…

Read More

November 11, 2021 | Andy London

Behavioral DLP—A Knock-out Punch for Legacy DLP and UEBA?

Knock, knock. Who’s there? The future? The future who? The future of people-centric data loss prevention. Wake up people! It’s…

Read More