WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

September 26, 2023 | Kellie Roessler

$16.2M: The High Cost of Insider "Risks"

Last week DTEX released the 2023 Cost of Insider Risks Global Report, independently conducted by Ponemon Institute. The…

Read More
Pentagon ‘Critical Compromise’ Who is Keeping Score

August 17, 2023 | Kellie Roessler

Pentagon Compromise | The Most Effective Insider Threat Sensors Are People

DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…

Read More
Agent vs Agentless A New Approach to Insider Risk Monitoring

October 31, 2023 | Kellie Roessler

Agent vs. Agentless: A New Approach to Insider Risk Monitoring

A question our customers commonly ask is whether our InTERCEPT insider risk management platform is agent-based or agentless. The…

Read More
DTEX EDR Integrations The Next Partner Opportunity

June 15, 2023 | Brian Stoner

DTEX EDR Integrations: The Next Partner Opportunity

In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact,…

Read More
Closing the trust-risk loop with file lineage

May 4, 2023 | Kellie Roessler

Closing the Trust-Risk Loop with File Lineage

The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike…

Read More
Data loss Prevention Best Practices for Employee Layoffs

March 28, 2023 | Musa Ishaq

Data loss Prevention Best Practices for Employee Layoffs

Seemingly every day, we receive news of another company retrenching and laying off several hundred people. These actions can…

Read More
2023 Insider Risk Investigations Report

March 16, 2023 | Kellie Roessler

2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration

Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…

Read More
Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale

March 1, 2023 | Kellie Roessler

Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale

The financial services sector is prone to insider abuse and data misuse, including fraud. For global banks and other…

Read More
case study dtex provides visibility and context

January 12, 2023 | Armaan Mahbod

Case Study: DTEX Provides Visibility and Context to Global Materials Company

A global materials science company that invests heavily in research and holds thousands of patents worldwide realized it needed a…

Read More
Crawl, Walk, Run How to Kickstart your Insider Risk Program

December 20, 2022 | Kellie Roessler

Crawl, Walk, Run: How to Kickstart your Insider Risk Program

Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing…

Read More
Why understanding insider risk is key to cyber resilience

December 15, 2022 | Kellie Roessler

Why Understanding Risk is Key to Cyber Resilience

Cyber resilience is the next frontier of cybersecurity, as organisations increasingly focus on mitigation with the sober acceptance that a…

Read More
Manufacturing case study for insider risk management blog post

November 8, 2022 | Rajan Koo

Balancing Security and Privacy to Protect a Global Manufacturer from Insider Risk

Protecting sensitive data from insider threats is a board-level issue in companies today. This is particularly true when an innovative…

Read More
Global Financial Services case study for Insider Risk Management blog post

October 20, 2022 | Andy London

Case Study: DTEX Helps a Global Financial Services Institution Mitigate Insider Threats

Insider threats are a problem for almost every industry, but financial services companies have always been—and will continue to…

Read More
MITRE and DTEX partnership announcement woman at computer insider threat

October 4, 2022 | Rajan Koo

Mitigating Malicious Insider Threats in a Hybrid World

Over the past two years, IT and cybersecurity teams have faced the challenge of protecting data while employees work almost…

Read More