WORKFORCE CYBER
INTELLLIGENCE
RESOURCES
A Human-Centric Approach to Operational Awareness and Risk Management

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Gartner 2023 Market Guide for Insider Risk Management Solutions
The latest Market Guide from Gartner discusses the state of insider risk management solutions, including an analysis of available tools.
Read More
Conversations from the Inside, Ep. 3: Slashing the $16.2M Cost of Insider Risk
The highly anticipated 2023 Cost of Insider Risks Global Report by Ponemon Institute is here, featuring first-time analysis on how…
Watch Now
GigaOm 2023 Radar Report for DLP
This GigaOm Radar Report highlights key DLP vendors and equips IT decision-makers with the information needed to select the best…
Read More
Gartner 2023 Market Guide for DLP
In this report, Gartner recognizes the current trend towards DLP tools converging with other Insider Risk Management offerings to truly…
Download Report
2023 Cost Of Insider Risks Global Report
Featuring first-time insights on how organizations are funding and governing insider risk programs.
Read More
2023 Ponemon Cost of Insider Risks Report Infographic
The 2023 Ponemon Cost of Insider Risks infographic depicts the financial effects of an insider incident both before and after…
Read More
Protecting Data and Exceeding Compliance with DTEX and Microsoft
This case study highlights how a government entity transitioned from a box-ticking approach to proactive IRM by leveraging DTEX and…
Read More
Insider Risk Management in the Mining Sector
This mining company chose DTEX for our consolidated approach to insider risk management for proactive mitigation.
Read More
Conversations from the Inside, Episode 2: The Psychology of Insider Risk Management - Time and Place Matters
In the second episode of Conversations from the Inside, Dr. Deanna Caputo from MITRE discusses how psychology plays a role…
Read More
SANS: Next-Gen Insider Threat Visibility & Prevention with DTEX InTERCEPT
Matt Bromiley from SANS Institute reviews DTEX InTERCEPT for Insider Risk Management.
Read More
Forrester Research: Best Practices Insider Risk Management
Security leaders can use this report to build an insider risk management (IRM) program with research from Forrester.
Read More
H-ISAC: Building a human-centric insider risk program for early detection and prevention of data loss
More than two-thirds of IP theft involves company insiders. As guardians of highly sensitive IP, the pharmaceutical industry is a…
Read More