remote workers
Insider Risk Management—A 7 Step Approach to Zero Trust (Part 1)
Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While the concept has been around since the 1990’s when Stephen Marsh wrote ...
DTEX i3 Team Q&A: The Super Malicious Insider
Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the DTEX i3 Team and real-life investigations they’ve led. Last year we saw remote ...
How to Protect Your Work-From-Home Workforce—Examining Forrester Research’s Take
Not too long ago Heidi Shey of Forrester Research released her thoughts on how enterprises can best protect the work-from-home workforce. The report, appropriately titled, “Protect Your Work-From-Home Workforce,” outlines well the ...
Securing Distributed Workspaces
As we all know, during 2020 and 2021 most of the world worked from home in distributed workspaces. This massive shift means users will continue to access information, data and systems from ...
Compliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring
Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task Force (NITTF) was established by Executive Order in 2011. In part, it ordered all ...
Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors
Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of acronyms representing government agencies and technologies. As such, it’s not uncommon to ...
New Year, New Security Risks: Why 2022 Will be The Year of Data Introduction
Cybersecurity threats continued to advance in 2021, as the ongoing Covid-19 pandemic accelerated digital transformation for enterprises around the world. In today’s distributed, remote environment, the workforce is the new firewall, raising ...
Leveraging the XDR Advantage in the Midst of a Pandemic
The pandemic has changed organizations’ technology priorities profoundly over the last two years. In a study reported on by Business Wire, cybersecurity and hybrid working constituted the top enterprise technology priorities looking ...
Simplify Zero Trust Secure Access to Business Applications
As remote work becomes a “new normal” and organizations are increasingly adopting a hybrid IT architecture, they are looking at how they can accelerate Zero Trust security and simplify secure business application ...
Tips to Help Secure a Remote Workforce
Increasing security of your remote employees is crucial to the security and integrity of your systems and data With the COVID-19 pandemic creating what appears to be the new normal, IT and ...