WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Proactive Insider Risk Management | A Case for Technology Consolidation
It is often said that any insider risk program must have a technology component to be effective in today’s enterprise…
Read More
2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration
Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…
Read More
7 Reasons to Ditch Endpoint DLP for Endpoint Visibility
Companies really don't have any business collecting or managing.
Read More
Data loss Prevention Best Practices for Employee Layoffs
Seemingly every day, we receive news of another company retrenching and laying off several hundred people. These actions can…
Read More
2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration
Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…
Read More
DTEX InTERCEPT Named Winner in 2023 Cybersecurity Excellence Awards
We are thrilled to share that DTEX InTERCEPT was named a winner in the 2023 Cybersecurity Excellence Awards for the…
Read More
What is Data Loss Prevention?
Data Loss Prevention, commonly referred to as DLP, refers to policies, technologies, and controls used by organizations to prevent accidental…
Read More
Global Security Leader Selects DTEX to Manage Insider Risk
In this new era of hybrid work, visibility into user behavior and actions is critical to thwarting insider threats and…
Read More
Insider Risk: When Business Gets Personal
In an ideal world, there is a clear delineation of where personal and professional engagements take place: anything business related…
Read More
Major US Lending Company Chooses DTEX to Mitigate Insider Risk
Insider risk is fast becoming a top priority for many enterprise organizations, particularly those in critical infrastructure industries. At…
Read More
Data Exfiltration Prevention: A How-To Guide
The most common goal of malicious insiders is stealing (or data exfiltrating) sensitive data by copying, transferring, emailing, or printing…
Read More
Why Understanding Risk is Key to Cyber Resilience
Cyber resilience is the next frontier of cybersecurity, as organisations increasingly focus on mitigation with the sober acceptance that a…
Read More
Balancing Security and Privacy to Protect a Global Manufacturer from Insider Risk
Protecting sensitive data from insider threats is a board-level issue in companies today. This is particularly true when an innovative…
Read More
Case Study: DTEX Helps a Global Financial Services Institution Mitigate Insider Threats
Insider threats are a problem for almost every industry, but financial services companies have always been—and will continue to…
Read More