Insider Risk Management—A 7 Step Approach to Zero Trust (Part 2)

A few weeks ago we shared with you the first part of our two-part blog series summarizing the key takeaways of the e-book we co-authored with Splunk, “An Insider Risk Management Approach to Zero Trust.” Now that we’ve all taken a moment to digest those learnings, we’re eager to pick ... Read More

Gartner Insider Risk Management Market Guide: 4 Things You Need to Know

By numerous measures, the insider risk management market has exploded in prominence and importance over the past three years. From the pandemic-induced work-from-anywhere movement, to the Great Resignation and now the prospect for increased layoffs, the risk from malicious insiders is more top-of-mind for security professionals and the C-suite than ... Read More
DTEX Systems Wins “Most Innovative Data Loss Prevention” and “Publisher’s Choice Insider Threat Prevention” in Global InfoSec Awards During RSA Conference 2022

DTEX Systems Wins “Most Innovative Data Loss Prevention” and “Publisher’s Choice Insider Threat Prevention” in Global InfoSec Awards During RSA Conference 2022

| | Un-categorized
After 2+ years, it was great to finally be back on-site at the 2022 RSA Conference (RSAC), the world’s leading information security conference and expo. It was even more exciting to kick off the week with two prestigious award wins from Cyber Defense Magazine (CDM), the industry’s leading electronic information ... Read More

Insider Risk Management & Actionable Reporting ~ No Video Required

| | Un-categorized
In our previous IRM vs. Insider Threat Surveillance blog post we discussed the importance of behavioral analytics as an input signal in determining insider-born risks. Why? Because without indicators of human intent to provide context to data from cyber-sensors that are capturing machine and application signals, there is no intelligence ... Read More

Workforce Cyber Intelligence & Security News Digest – May 2022

We are gearing up to start travel and in-person conferences again and are excited to see many of our customers and industry colleagues for the first time in two or more years. Much has changed over that time period, especially in regards to insider threat management. While our team is ... Read More

Understanding Behavioral Intent Doesn’t Equal Invasive Surveillance

One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration), for security professionals is the need to understand user behavior better. WFA forced security teams to switch from a corporate perimeter-centric focus to a requirement to protect hundreds of thousands of ... Read More

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 1)

Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While the concept has been around since the 1990’s when Stephen Marsh wrote about “Formalising Trust as a Computational Concept,” the COVID-19 pandemic and resulting shift to a remote and hybrid ... Read More
Why Scalability is a Must Have for Insider Risk Management

Why Scalability is a Must Have for Insider Risk Management

This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read the previous posts here. Scalability and Total Cost of Ownership are critical factors in almost every enterprise IT operation, including security. In today’s dynamic environment, organizations need solutions that reduce demands ... Read More

Why You Need a Multi-national IRM Program

Insider Risk or Threat Management (IRM) programs are quickly becoming a must-have for global organizations and enterprises. The risk of losing customer information, trade secrets, and other sensitive data due to negligent and malicious actors poses a real threat. The rise of the super malicious insider, recruitment campaigns by international ... Read More
Privacy Makes all the Difference: Insider Risk Management and Insider Threat Surveillance

Privacy Makes all the Difference: Insider Risk Management and Insider Threat Surveillance

As insider risks, whether born from negligence, external intimidation, or true malicious internal threats, grow, organizations need to take steps to identify and eliminate these threats. In a previous post we discussed two competing approaches: Insider Risk Management and Insider Threat Surveillance. We promised to examine more closely seven core ... Read More