WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Insider Risk Management or Insider Threat Surveillance?
The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…
Read More
2022 Insider Risk Report ~ The Rise of the Super Malicious Insider
Earlier today we published our 2022 Insider Risk Report, our fifth consecutive since 2017. The purpose of our reports…
Read More
Massive Tech Layoffs Continue to Increase Insider Risks for Enterprises
The looming recession is driving big tech companies to reduce their workforce in 2023, with Microsoft being the latest to…
Read More
The Gig is Up! And that's Not All Good
This is the time of year when everyone is looking for little extra cash to pay off a few holiday…
Read More
Crawl, Walk, Run: How to Kickstart your Insider Risk Program
Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing…
Read More
Insider Threats in an Unstable Economy: DTEX i3 Team Data
This year has been a turbulent one for employers and employees alike. We rang in 2022 amid The Great Resignation—a…
Read More
The Future Workforce is One of Empathy
The world has changed, and so too has the way we work. Employees now want and expect faster, smarter, and…
Read More
Case Study: DTEX Helps a Global Financial Services Institution Mitigate Insider Threats
Insider threats are a problem for almost every industry, but financial services companies have always been—and will continue to…
Read More
Reducing Insider Risk Through Employee Empathy
We have written before about the Great Resignation and the risk of people taking sensitive data to their new…
Read More
Moving from Insider Risk to Insider Threat: Disgruntled Employees and Looming Layoffs
There’s been a lot of misconception about the quiet quitting movement since Zaid Khan, a 24-year-old engineer from New York, …
Read More
Why Bring Your Own Applications is the new Shadow IT
It is increasingly simple and common for employees to download and use cloud-based applications for work-related purposes, known as…
Read More
Understanding Who’s ACTUALLY Using that Expensive Software You're Paying For
Many organizations have a variety of tools that they spend time researching, vetting, being trained on, and then never using…
Read More
Remote Workforce Analytics WITH Remote Workforce Trust
In an earlier post we introduced readers to Workforce Cyber Intelligence. To recap briefly, Workforce Cyber Intelligence provides organizations…
Read More
The Difference Between Insider Risk and Insider Threats
Every square is a rectangle, but not every rectangle is a square. You may be wondering why we’re starting this…
Read More