WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

September 26, 2023 | Kellie Roessler

$16.2M: The High Cost of Insider "Risks"

Last week DTEX released the 2023 Cost of Insider Risks Global Report, independently conducted by Ponemon Institute. The…

Read More
Pentagon ‘Critical Compromise’ Who is Keeping Score

August 17, 2023 | Kellie Roessler

Pentagon Compromise | The Most Effective Insider Threat Sensors Are People

DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…

Read More
Measuring the Efficacy of your Insider Risk Program

November 21, 2023 | Christopher Burgess

5 Key Areas to Help Measure your Insider Risk Program Effectiveness

For those dealing with insider risks for as long as I have, justifying the mission can feel akin to providing…

Read More
Building an Insider Risk Program | 3 Experts Weight In

August 7, 2023 | Kellie Roessler

Building a Human-Centric Insider Risk Program | Three Experts Weigh In

Building a human-centric insider risk program has become a key priority for most federal and critical infrastructure organizations. But how…

Read More
Insider Risk Management Why You Need an Employee Assistance Program

July 7, 2023 | Christopher Burgess

Insider Risk Management | Why You Need an Employee Assistance Program

There is no debate, regardless of sector, that an organization’s most valuable resource is its people. It makes sense then…

Read More
Insider Risk Management Solution

June 20, 2023 | Christopher Burgess

People: The Nuclei of Your Insider Risk Management Solution

Every company has them, some more than others. They are at home, across the seas, or down the hall. I…

Read More
Insider Risk Resolution A Decision Tree Framework

May 18, 2023 | Kellie Roessler

Insider Risk Resolution: A Decision Tree Framework

Data loss from employees is an increasing concern for enterprise organizations and federal entities. Findings from the DTEX i3…

Read More
Closing the trust-risk loop with file lineage

May 4, 2023 | Kellie Roessler

Closing the Trust-Risk Loop with File Lineage

The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike…

Read More
When History Repeats Insider Risk Lessons from Pentagon Leaks

April 14, 2023 | Kellie Roessler

When History Repeats | Insider Risk Lessons from the Pentagon Leaks

The arrest of a junior US air national guardsman for taking and sharing classified military intelligence is less a…

Read More
Telecommunications case study Insider Risk Management blog post

March 30, 2023 | Kellie Roessler

Australia Pushes Pedal on Cyber Infrastructure Resilience

Australia’s Department of Home Affairs has hosted its first Cyber and Infrastructure Conference, providing industry professionals insights…

Read More
Data loss Prevention Best Practices for Employee Layoffs

March 28, 2023 | Musa Ishaq

Data loss Prevention Best Practices for Employee Layoffs

Seemingly every day, we receive news of another company retrenching and laying off several hundred people. These actions can…

Read More
2023 Insider Risk Investigations Report

March 16, 2023 | Kellie Roessler

2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration

Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…

Read More
HR’s Growing Role in Cybersecurity

March 7, 2023 | Lynsey Wolf

HR’s Growing Role in Cybersecurity

Companies worried about cybersecurity should know that the real risk is inside their corporate firewall. Corporate leaders spend a lot…

Read More
The importance of trust in your insider program

February 23, 2023 | Christopher Burgess

The Importance of Trust in your Insider Risk Program

A hydrologist will tell you water runs downhill. The same goes for policy decisions within companies, regardless of size. If…

Read More