Key Takeaways from the Gartner® Market Guide for Insider Risk Management
Insider risk incidents are on the rise and becoming more costly to contain. As a result, earlier this year, Gartner predicted that 50% of all medium to large enterprises would adopt insider risk programs. To help organizations understand what they need to do to create insider risk programs or to ... Read More
7 Reasons to Ditch Endpoint DLP for Endpoint Visibility
Companies really don't have any business collecting or managing. The post 7 Reasons to Ditch Endpoint DLP for Endpoint Visibility appeared first on DTEX Systems Inc ... Read More
Data loss Prevention Best Practices for Employee Layoffs
Seemingly every day, we receive news of another company retrenching and laying off several hundred people. These actions can leave a sense of anger for the people who are cut and uneasiness for the people who remain and are fearful they might be next. In both instances, it is not ... Read More
Layoffs & Cyber Security: How to Proactively (and Empathetically) Mitigate Risk
The potential for an economic recession is raising cost-consciousness for organizations globally. It’s also changing how businesses should be thinking about security risks, especially insider threats that may result from layoffs. There are currently many heightened sensitivities to navigate as it relates to employee cutbacks—and understandably so—with organizations such as ... Read More
Ubiquiti Insider Threat Case: Lessons Learned from DTEX’s I3 Team
Nickolas Sharp, a former employee of Ubiquiti, was arrested and charged earlier this month with data theft and attempting to extort his employer. CSO Online has a detailed writeup on the case, which is a clear example of Insider Threat, but there is an interesting twist…Sharp also posed as a ... Read More
Stories from the Field – Kaseya REvil Ransomware Attacks
Welcome back to our Stories from the Field series, where we share info on how our Insider Threat analysts work with customers to proactively defend their environments against emerging threats. In this post, we’ll dive into the details of how we worked to respond to the Kaseya REvil ransomware attacks, ... Read More