DTEX and Microsoft 365 E5 | Powering Next Gen Insider Risk Management

DTEX and Microsoft are proven tech players in their own right. But together, they take insider risk management to the next level, providing another layer of visibility to empower analysts to stay ahead of the most sophisticated, rule-bending insider. DTEX InTERCEPT integrates with Microsoft 365 E5 to enable enterprise organizations ... Read More

DTEX EDR Integrations: The Next Partner Opportunity

In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact, the DTEX i3 2022 Insider Risk Investigations Report found 75% of insider threat criminal prosecutions were the result of remote workers. The challenge has been the lack of visibility in ... Read More
Insider Risk Legislation Is Coming

Insider Risk Legislation is Coming: Are You Prepared?

The rise of foreign interference and high-profile breaches has highlighted the need to address the human element in cybersecurity through a proactive insider risk program. In many ways, Australia is leading the way in this area of reform. The Security of Critical Infrastructure (SOCI) Act is perhaps the strongest display ... Read More

Insider Risk Resolution: A Decision Tree Framework

Data loss from employees is an increasing concern for enterprise organizations and federal entities. Findings from the DTEX i3 2023 Insider Risk Investigations Report show that departing employees don’t leave empty handed, with 12% taking sensitive IP with them. The number of insider incidents is also on the rise; our ... Read More
Closing the trust-risk loop with file lineage

Closing the trust-risk loop with file lineage

The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike a balance to prevent data loss while maintaining loyalty. As an IT specialist for the Air National Guard, Jack Teixeira – the US airman behind the leak of US military secrets ... Read More
DTEX Named “Most Comprehensive Insider Threat Prevention” in Global InfoSec Awards

DTEX Named “Most Comprehensive Insider Threat Prevention” in Global InfoSec Awards

We are thrilled to kick off the 2023 RSA Conference with two award wins from Cyber Defense Magazine (CDM): Most Comprehensive Insider Threat Prevention and Best Product Data Loss Prevention (DLP). This is the third consecutive year DTEX has been honored in the Global InfoSec Awards. This accolade further validates ... Read More

Busted: Misconceptions on Insider Risk Programs

Insider risk management is gaining momentum, as organizations increasingly accept that cybersecurity is a human challenge that requires a human solution. The data shows that humans are a common factor in cybersecurity incidents. Gartner recently revealed that by 2027, 50% of CISOs will formally adopt human-centric design practices into their ... Read More
When History Repeats | Insider Risk Lessons from Pentagon Leaks

When History Repeats | Insider Risk Lessons from the Pentagon Leaks

The arrest of a junior US air national guardsman for taking and sharing classified military intelligence is less a story about data theft or even war. It’s a story about how sensitive information, when leaked to the wrong hands, has the power to shape history – for better or worse ... Read More

DTEX Insider Risk News Digest – Q1, 2023

It’s been a busy first quarter for DTEX and the broader cybersecurity community. There’s been a wealth of commentary about the need to address the human element in cyber and, in particular, in insider risk management. There have also been a host of security incidents attributed to employee layoffs – ... Read More
Australia pushes pedal on cyber infrastructure resilience

Australia pushes pedal on cyber infrastructure resilience

Australia’s Department of Home Affairs has hosted its first Cyber and Infrastructure Conference, providing industry professionals insights to champion organizational security and resilience. Held in Sydney on 25 March, the inaugural event featured a number of expert speakers, a panel Q&A and a live hypothetical exercise on managing security risk ... Read More