Closing the trust-risk loop with file lineage

Closing the trust-risk loop with file lineage

The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike a balance to prevent data loss while maintaining loyalty. As an IT specialist ...

7 Reasons to Ditch Endpoint DLP for Endpoint Visibility

Companies really don't have any business collecting or managing. The post 7 Reasons to Ditch Endpoint DLP for Endpoint Visibility appeared first on DTEX Systems Inc ...

2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration

Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one key goal: To empower organizations to better understand and mitigate insider risk, so ...

Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale

The financial services sector is prone to insider abuse and data misuse, including fraud. For global banks and other financial institutions, the cost of a security incident can quickly add up to ...

Cloud Security Best Practices To Increase Visibility Across Applications

As enterprises are accelerating the adoption of digital transformation, the attack surface is rapidly expanding into cloud and multi-cloud environments.  In order to effectively detect and respond to threats, the visibility that ...

Case Study: DTEX Provides Visibility and Context to Global Materials Company

A global materials science company that invests heavily in research and holds thousands of patents worldwide realized it needed a modern and scalable solution to protect against malicious insiders, competitors and other ...

Crawl, Walk, Run: How to Kickstart your Insider Risk Program

Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing an Insider Risk Program should be a top priority. Off the back ...

Why Understanding Risk is Key to Cyber Resilience

Cyber resilience is the next frontier of cybersecurity, as organisations increasingly focus on mitigation with the sober acceptance that a breach will inevitably occur. The rise in both volume and sophistication of ...
WOW! We Have a Problem…

WOW! We Have a Problem…

| | Blog, healthcare, visibility
The medical industry is especially vulnerable to attacks stemming from workstations on wheels. In this post, we will lay out the problems they introduce and tell you how to address them. Quick ...

Balancing Security and Privacy to Protect a Global Manufacturer from Insider Risk

| | DLP, insider threat, UEBA, visibility
Protecting sensitive data from insider threats is a board-level issue in companies today. This is particularly true when an innovative organization invests heavily in research and development and therefore has a lot ...