WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

September 26, 2023 | Kellie Roessler

$16.2M: The High Cost of Insider "Risks"

Last week DTEX released the 2023 Cost of Insider Risks Global Report, independently conducted by Ponemon Institute. The…

Read More
Pentagon ‘Critical Compromise’ Who is Keeping Score

August 17, 2023 | Kellie Roessler

Pentagon Compromise | The Most Effective Insider Threat Sensors Are People

DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…

Read More
Building an Insider Risk Program | 3 Experts Weight In

August 7, 2023 | Kellie Roessler

Building a Human-Centric Insider Risk Program | Three Experts Weigh In

Building a human-centric insider risk program has become a key priority for most federal and critical infrastructure organizations. But how…

Read More
2023 Insider Risk Investigations Report

March 16, 2023 | Kellie Roessler

2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration

Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…

Read More
How OCSF Supports Proactive Insider Risk Management

March 14, 2023 | Bahman Mahbod

DTEX InTERCEPT Named Winner in 2023 Cybersecurity Excellence Awards

We are thrilled to share that DTEX InTERCEPT was named a winner in the 2023 Cybersecurity Excellence Awards for the…

Read More
Why understanding insider risk is key to cyber resilience

December 15, 2022 | Kellie Roessler

Why Understanding Risk is Key to Cyber Resilience

Cyber resilience is the next frontier of cybersecurity, as organisations increasingly focus on mitigation with the sober acceptance that a…

Read More
Manufacturing case study for insider risk management blog post

November 8, 2022 | Rajan Koo

Balancing Security and Privacy to Protect a Global Manufacturer from Insider Risk

Protecting sensitive data from insider threats is a board-level issue in companies today. This is particularly true when an innovative…

Read More
Global Financial Services case study for Insider Risk Management blog post

October 20, 2022 | Andy London

Case Study: DTEX Helps a Global Financial Services Institution Mitigate Insider Threats

Insider threats are a problem for almost every industry, but financial services companies have always been—and will continue to…

Read More
Globe News

October 11, 2022 | Rajan Koo

Workforce Cyber Intelligence and Security News Digest—Products, Partners, and More 2022

Who can believe we have less than three months until the end of 2022? The momentum behind DTEX continues at…

Read More

October 6, 2022 | Rajan Koo

CyberSecurity Breakthrough Awards Recognizes DTEX as “User Behavior Analytics Platform of the Year"

We are thrilled to announce that DTEX’s Workforce Cyber Intelligence & Security platform was named User Behavior Analytics Platform…

Read More
MITRE and DTEX partnership announcement woman at computer insider threat

October 4, 2022 | Rajan Koo

Mitigating Malicious Insider Threats in a Hybrid World

Over the past two years, IT and cybersecurity teams have faced the challenge of protecting data while employees work almost…

Read More
Disgruntled employees layoffs insider risk management blog post

September 20, 2022 | Rajan Koo

Moving from Insider Risk to Insider Threat: Disgruntled Employees and Looming Layoffs

There’s been a lot of misconception about the quiet quitting movement since Zaid Khan, a 24-year-old engineer from New York, …

Read More
Garnter 2022 Market Guide for DLP blog post and download

August 9, 2022 | DTEX Systems

Thoughts on Gartner’s 2022 Market Guide for Data Loss Prevention

With another Summer comes another addition of the Gartner Market Guide for Data Loss Prevention. More key findings, more…

Read More
Two young businesswomen shaking hands in a modern office discussing insider risk management

June 23, 2022 | DTEX Systems

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 2)

A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…

Read More