WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

May 5, 2022 | Dtex Systems

Insider Risk Management or Insider Threat Surveillance?

The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…

Read More

February 8, 2022 | Rajan Koo

2022 Insider Risk Report ~ The Rise of the Super Malicious Insider

Earlier today we published our 2022 Insider Risk Report, our fifth consecutive since 2017. The purpose of our reports…

Read More

May 17, 2022 | Dtex Systems

Why Scalability is a Must Have for Insider Risk Management

This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…

Read More

May 5, 2022 | Dtex Systems

Insider Risk Management or Insider Threat Surveillance?

The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…

Read More

April 28, 2022 | Dtex Systems

A New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare

Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…

Read More

April 7, 2022 | Armaan Mahbod

DTEX i3 Team Q&A: The Super Malicious Insider

Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…

Read More

February 3, 2022 | Dtex Systems

Compliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring

Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…

Read More

January 18, 2022 | Dtex Systems

Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors

Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…

Read More

November 22, 2021 | Rajan Koo

DTEX Systems Offers NGAV Customers Access to Zero Trust DLP & Human Forensic Telemetry via the CrowdStrike Falcon Platform

If the last 20+ years of cyberattacks have taught us anything, it is that humans are both an enterprise’s greatest…

Read More

November 19, 2021 | Dtex Systems

Getting DLP Right: Considering Gartner’s Thoughts on the Four Elements of a Successful DLP Program

The DLP struggle is real according to Andrew Bales, Associate Principal Analyst with Gartner. So real in fact…

Read More

November 16, 2021 | Dtex Systems

Top Challenges to Managing Insider Threats

In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…

Read More

November 11, 2021 | Andy London

Zero Trust DLP—A Knock-out Punch for Legacy DLP and UEBA?

Knock, knock. Who’s there? The future? The future who? The future of people-centric data loss prevention. Wake up people! It’s…

Read More

November 9, 2021 | Dtex Systems

How to Determine What Data to Protect and Who to Protect It From

We had the opportunity to moderate an incredibly interesting panel discussion at the SANS Institute Forum back in September,…

Read More

November 4, 2021 | Rajan Koo

macOS Monterey Demonstrates Apple’s Commitment to User Privacy & Enterprise Workforce Security

On October 25, 2021 Apple released macOS Monterey, the 18th and current major release of macOS, Apple’s desktop operating…

Read More