Enterprises are missing the warning signs of insider threats

Organizations struggle to identify the warning signs of insider threats, according to a report by the Ponemon Institute. The report surveyed a global pool of 1,249 IT and IT security practitioners and found that 53% of companies find it impossible or v… Continue reading Enterprises are missing the warning signs of insider threats

40% of SaaS assets are unmanaged, putting companies at risk for data leaks

DoControl announced a report which provides data-driven insights into the growing number of external and insider threats due to vast amounts of unmanageable data in today’s enterprises. Based on customer data, the findings clearly illustrate there is a… Continue reading 40% of SaaS assets are unmanaged, putting companies at risk for data leaks

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were recently the only company named a Leader and Fast Mover in the GigaOm Radar Report for Data Loss Prevention. If you’re interested in checking out t… Continue reading The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

The Next Disruptive ICS Attacker: A Disgruntled Insider?

Often, the most critical threats come from within an organization itself. This is true for all sectors, but it is especially true for industrial control systems (ICS). Technicians in these environments already have access to plant controls and may have… Continue reading The Next Disruptive ICS Attacker: A Disgruntled Insider?

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they reveal – in scrupulous detail – who in your organization is using which software products on which devices.
The post An Unexpected Cost-S… Continue reading An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user groups in large enterprises sometimes deploy due to a perceived lack of urgency, responsiveness and/or support from the central IT … Continue reading Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

57% of reported incidents are caused by insiders

Insider data breaches were the top cause of data and cybersecurity incidents reported in the first quarter of 2021, according to the ICO. 57% of reported incidents were caused by insiders, with over 1,000 incidents reported in the first three months of… Continue reading 57% of reported incidents are caused by insiders

VicTrack & DTEX: Security Product for Business Continuity Planning?

Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits here through DTEX’s security product.
The post VicTrack & DTEX: Security Product for Business Continuity… Continue reading VicTrack & DTEX: Security Product for Business Continuity Planning?

What is the cost of an insider data breach?

As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by employees as a normal course of everyday business or as they prepare for their n… Continue reading What is the cost of an insider data breach?

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

We want to trust our employees and contractors working within our organizations. For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business … Continue reading CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!