WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

When it Comes to Insider Risk, the Difference is Human
We have a saying here at DTEX: the difference is human. We know that enterprise security is only achievable when…
Read More
Crawl, Walk, Run: How to Kickstart your Insider Risk Program
Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing…
Read More
Mitigating Malicious Insider Threats in a Hybrid World
Over the past two years, IT and cybersecurity teams have faced the challenge of protecting data while employees work almost…
Read More
GigaOm Recognizes DTEX as the Only Outperforming Leader in 2022 Data Loss Prevention Radar Report
There is nothing more gratifying in a crowded market filled with good technology, built by smart people, than to be…
Read More
Case Study: DTEX InTERCEPT Helps Multinational Retailer Gain Visibility into Risk in Retail Stores
As insider risks and threats become more prevalent with the rise of e-commerce and hybrid work, cybersecurity tools are…
Read More
Thoughts on Gartner’s 2022 Market Guide for Data Loss Prevention
With another Summer comes another addition of the Gartner Market Guide for Data Loss Prevention. More key findings, more…
Read More
Insider Risk Intelligence—A Value Multiplier for the Cyber Ecosystem
We all know there is no “silver bullet” to solve address all security threats. Enterprise security professionals use a variety…
Read More
Insider Risk Management—A 7 Step Approach to Zero Trust (Part 2)
A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…
Read More
Understanding Behavioral Intent Doesn't Equal Invasive Surveillance
One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…
Read More
Insider Risk Management—A 7 Step Approach to Zero Trust (Part 1)
Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While…
Read More
Why Scalability is a Must Have for Insider Risk Management
This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…
Read More
Insider Risk Management or Insider Threat Surveillance?
The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…
Read More
A New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare
Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…
Read More
DTEX i3 Team Q&A: The Super Malicious Insider
Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…
Read More