• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: insider threat

NSA Programming Languages

Most Organizations Lack Visibility Into Their Insider Risk

Cloud technologies, remote work, the Great Resignation and a corporate disconnect are leading to increased insider risk, Code42 report finds.

February 10, 2022 Zachary Comeau Leave a Comment

The continued adoption of cloud technologies and a lack of visibility into them, the Great Resignation and employees taking IP and sensitive data with them, and a disconnect between executives and IT workers are leading to increased insider risk, according Code42. The insider risk management software firm’s Annual Data Exposure Report for 2022 finds that […]

Read More

Splunk and DTEX Systems Partner to Accelerate Zero-Trust Security Operations with Insider Risk Intelligence & Noise-free Endpoint Telemetry

September 27, 2021 TechDecisions Staff Leave a Comment

Workforce Cyber Intelligence & Security Solution Delivers the Contextual Human Activity Intelligence and Endpoint Telemetry Ignored by NGAV, UEBA and DLP Tools SAN FRANCISCO & SAN JOSE, Calif.–(BUSINESS WIRE)–#Splunk—DTEX Systems, the Workforce Cyber Intelligence and Security company™, today announced a partnership with Splunk Inc., provider of the Data-to-Everything™ Platform, to deliver a superior, zero-trust approach […]

Read More

DTEX to Host Insider Risk Management Virtual Conference with the SANS Institute

August 5, 2021 TechDecisions Staff Leave a Comment

Thought Leaders from Williams Racing, The MITRE Corporation, Ponemon Institute, SANS Institute and More Gather to Discuss and Discover Solutions to Manage the Growing Insider Risk Challenge SAN JOSE, Calif.–(BUSINESS WIRE)–#cybersecurity—DTEX Systems, the Workforce Cyber Intelligence & Security Company™, today announced it will exclusively sponsor the upcoming 2021 Insider Risk Management Solutions Forum alongside the […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

New Email Rules, MFA Bypass Are Top Hacking Tactics So Far in 2023

Cybersecurity firm Expel's 2023 first quarter threat report finds that hackers are hiding their activity with email rules and bypassing MFA.

June 1, 2023 Zachary Comeau Leave a Comment

Account compromise, new inbox rules designed to hide malicious activity, and multifactor authentication bypass are the most popular hacking tactics being utilized by threat actors so far in 2023, according to a new report from cybersecurity firm Expel. According to the managed detection and response provider, identity-based attacks such as account compromise, account takeover and […]

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Podcast Episode 195: Zero Trust Adoption Challenges and Drivers

Chalan Aras, the managing director of cyber and strategic risk at Deloitte, joins the podcast to talk about issues with zero trust adoption.

May 25, 2023 Zachary Comeau Leave a Comment

On this episode of the My TechDecisions Podcast, we discuss zero trust adoption challenges and drivers with Chalan Aras, the managing director of cyber and strategic risk at Deloitte. According to a recent Deloitte poll, legacy systems and environments are the greatest challenge to adopting zero trust, with 44.6% of executives agreeing to that sentiment. […]

Read More

Proofpoint CISO, CISOs cyberattack

CISOs Are Less Confident in Their Organization’s Security in 2023

Proofpoint study finds 68% of CISOs now feel at risk for a material cyberattack, compared to just 48% in 2022.

May 16, 2023 Zachary Comeau Leave a Comment

The pandemic introduced an entirely new way of working that delighted many end users, but IT departments and cybersecurity professionals had their work cut out for them as they were required to deploy, manage and secure technologies designed to support distributed work. That shift to distributed work resulted in new cyberattack vectors that had even […]

Read More

Zero Trust, Leostream, AWS

What is Holding Up Your Zero Trust Implementation?

Nearly 45% of executives say legacy systems and environments are the greatest challenge to adopting zero trust, according to Deloitte.

April 21, 2023 Zachary Comeau Leave a Comment

Despite a growing consensus that zero trust security policies can help keep organizations secure, companies are struggling with legacy technology and the associated complexities and compatibility issues as they also look to modernize their infrastructure. According to new research from business management consulting firm Deloitte, legacy systems and environments are the greatest challenge to adopting […]

Read More

insider threats, military document leak, Jack Teixeira, insider risk

The Alleged U.S. Military Document Leaker Worked in IT

The Air National Guardsman and IT worker arrested for leaking sensitive documents is a reminder to take insider risk seriously.

April 14, 2023 Zachary Comeau Leave a Comment

The FBI has arrested an alleged leaker of sensitive and highly classified U.S. military documents on the Ukraine-Russia conflict, arresting a 21-year-old Massachusetts Air National Guardsman and accusing him of posting the documents on a Discord server. That individual, Jack Teixeira, was an IT worker for the Air National Guard, working as a Cyber Defense […]

Read More

spear phishing, Phishing bait alert concept on a smartphone screen

Armorblox: BEC Attacks Increased by 72% YOY

BEC attacks surged 72% YoY with companies being targeted by language-based and socially engineered attacks across industries, finds Armorblox.

April 13, 2023 Alyssa Borelli Leave a Comment

Threat researchers at email security firm Armorblox have found that business email compromise (BEC) attacks have increased dramatically by 72% year-over-year. In its second, annual 2023 Email Security Threat Report, the company says it continues to see high volumes of language-based and socially engineered attacks targeting organizations of all sizes and across industries. Vendor compromise […]

Read More

Secure collaboration

Businesses Need Secure and Fast Collaboration

Businesses are trying to figure out how to combine the best of both worlds: real-time collaboration with control, visibility and security.

December 13, 2022 Ofer Klein Leave a Comment

According to a recent study, 96% of corporate executives think that productive remote and hybrid work is dependent on clear communication. Additionally, Slack asserts that the use of collaboration tools can boost productivity by 30%. It makes sense that organizations are adopting these SaaS based technologies, given their many advantages. They facilitate collaboration, which is […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 9
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.