The Proactive Power of Tabletop Exercises in Insider Risk Management

As the adage goes, “practice makes perfect.” To get as close to perfection as possible in any endeavor, one must expect there to be an education and practice quotient. This is especially ...
Early insider risk detection - Behavioral Risk Model

Early Insider Risk Detection Hinges on Quality Data – Not AI

DTEX recently became the first cybersecurity company to launch a dedicated AI assistant specifically for insider risk management. The Ai3 Risk Assistant democratizes nuanced behavioral data analysis to guide analysts and seriously ...

What is a Behavioral Risk Indicator? Demystifying Insider Risk Indicators

Insiders – the people with legitimate access to an organization’s data and systems – are the root cause of most cybersecurity incidents. As humans, insider risks are complex. Their behaviors and intentions ...

Measuring the Efficacy of your Insider Risk Program

For those dealing with insider risks for as long as I have, justifying the mission can feel akin to providing results to Fermat’s Last Theorem.  There are solutions to each challenge, but ...

Building a Human-Centric Insider Risk Program | Three Experts Weight In

Building a human-centric insider risk program has become a key priority for most federal and critical infrastructure organizations. But how do you get started? How do you do it justice? There are ...

Insider Risk Management | Why You Need an Employee Assistance Program

There is no debate, regardless of sector, that an organization’s most valuable resource is its people. It makes sense then that an Employee Assistance Program (EAP) can support a holistic Insider Risk ...

People: The Nuclei of Your Insider Risk Management Solution

Every company has them, some more than others. They are at home, across the seas, or down the hall. I am talking about your colleagues, partners, vendors, and customers, all of whom ...

Insider Risk Resolution: A Decision Tree Framework

Data loss from employees is an increasing concern for enterprise organizations and federal entities. Findings from the DTEX i3 2023 Insider Risk Investigations Report show that departing employees don’t leave empty handed, ...
Closing the trust-risk loop with file lineage

Closing the trust-risk loop with file lineage

The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike a balance to prevent data loss while maintaining loyalty. As an IT specialist ...
When History Repeats | Insider Risk Lessons from Pentagon Leaks

When History Repeats | Insider Risk Lessons from the Pentagon Leaks

The arrest of a junior US air national guardsman for taking and sharing classified military intelligence is less a story about data theft or even war. It’s a story about how sensitive ...

Secure Guardrails