WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
Countering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreZero Trust Meets Insider Risk Management
What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in…
Read MoreCase Study: DTEX Helps a Global Financial Services Institution Mitigate Insider Threats
Insider threats are a problem for almost every industry, but financial services companies have always been—and will continue to…
Read MoreWorkforce Cyber Intelligence and Security News Digest—Products, Partners, and More 2022
Who can believe we have less than three months until the end of 2022? The momentum behind DTEX continues at…
Read MoreMitigating Malicious Insider Threats in a Hybrid World
Over the past two years, IT and cybersecurity teams have faced the challenge of protecting data while employees work almost…
Read MoreGigaOm Recognizes DTEX as the Only Outperforming Leader in 2022 Data Loss Prevention Radar Report
There is nothing more gratifying in a crowded market filled with good technology, built by smart people, than to be…
Read MoreCase Study: DTEX InTERCEPT Helps Multinational Retailer Gain Visibility into Risk in Retail Stores
As insider risks and threats become more prevalent with the rise of e-commerce and hybrid work, cybersecurity tools are…
Read MoreThoughts on Gartner’s 2022 Market Guide for Data Loss Prevention
With another Summer comes another addition of the Gartner Market Guide for Data Loss Prevention. More key findings, more…
Read MoreInsider Risk Intelligence—A Value Multiplier for the Cyber Ecosystem
We all know there is no “silver bullet” to solve address all security threats. Enterprise security professionals use a variety…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 2)
A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…
Read MoreUnderstanding Behavioral Intent Doesn't Equal Invasive Surveillance
One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 1)
Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While…
Read MoreWhy Scalability is a Must Have for Insider Risk Management
This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…
Read MoreInsider Risk Management or Insider Threat Surveillance?
The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…
Read More