INSIDER RISK INSIGHTS, NEWS, AND ANALYSIS
BLOG
![Insider Risk Insights - DTEX Blog](https://www.dtexsystems.com/wp-content/uploads/2021/02/DTEX_website_imagesBlog_Hero.jpg)
The Latest Insider Risk Insights
![How DTEX is Supporting National Security](https://www.dtexsystems.com/wp-content/uploads/2024/06/Mission-Possible-How-DTEX-is-Supporting-National-Security-from-the-Inside-Out-1-scaled.jpeg)
"Mission Possible": How DTEX is Supporting National Security from the Inside Out
When considering the most significant cyber threats to the public sector, many immediately think of foreign adversaries breaching federal agencies.
Read More![](https://www.dtexsystems.com/wp-content/uploads/2024/04/DTEX_Banners_Insider-Risk-Report_r2_1200x627_opt2-1.png)
Countering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read More![Agent vs Agentless A New Approach to Insider Risk Monitoring](https://www.dtexsystems.com/wp-content/uploads/2023/10/Agent-vs-Agentless-A-New-Approach-to-Insider-Risk-Monitoring.jpeg)
Agent vs. Agentless: A New Approach to Insider Risk Monitoring
A question our customers commonly ask is whether our InTERCEPT insider risk management platform is agent-based or agentless. The…
Read More![Understanding pseudonymization and anonymization](https://www.dtexsystems.com/wp-content/uploads/2023/02/Understanding-pseudonymization-and-anonymization-3.jpg)
Pseudonymization vs. Anonymization
A common challenge organizations face is striking the balance between employee privacy and insider risk monitoring. Using pseudonymization, organizations can…
Read More![forcepoint vs dtex](https://www.dtexsystems.com/wp-content/uploads/2023/04/forcepoint-vs-dtex.jpg)
DTEX Enables a Privacy-First Approach to Security for a Fortune 500 Workforce
Insider risk management can be tricky for any company, but for a multi-national organization with a highly distributed workforce, the…
Read More![Bring Your Own Applications Shadow IT Insider Risk Management](https://www.dtexsystems.com/wp-content/uploads/2022/09/iStock-1202697044-scaled.jpg)
Why Bring Your Own Applications is the new Shadow IT
It is increasingly simple and common for employees to download and use cloud-based applications for work-related purposes, known as…
Read More![Insider Risk Management blog post tablet expensive software](https://www.dtexsystems.com/wp-content/uploads/2022/09/iStock-520623320.jpg)
Understanding Who’s ACTUALLY Using that Expensive Software You're Paying For
Many organizations have a variety of tools that they spend time researching, vetting, being trained on, and then never using…
Read More![working from home or remote employee analytics monitoring](https://www.dtexsystems.com/wp-content/uploads/2022/09/iStock-1256311279.jpg)
Remote Workforce Analytics WITH Remote Workforce Trust
In an earlier post we introduced readers to Workforce Cyber Intelligence. To recap briefly, Workforce Cyber Intelligence provides organizations…
Read More![](https://www.dtexsystems.com/wp-content/uploads/2021/08/blog-steganography.jpg)
The Privacy Patent that Makes Workforce Cyber Intelligence Possible
Building an engaged workforce in a work-from-anywhere environment is important to business success. As noted in other posts, an…
Read More![PULSE Workforce of the future privacy intelligence insider risk management employee monitoring](https://www.dtexsystems.com/wp-content/uploads/2022/08/Pulse-Blog-Thumbnail.jpg)
The Workforce of the Future, Cyber Intelligence & Privacy
The Work-from-Anywhere (WFA) movement predates the pandemic, but COVID-19 was an unprecedented accelerant. Millions of workers suddenly became “remote workers”…
Read More