WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreZero Trust Meets Insider Risk Management
What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in…
Read MoreAgent vs. Agentless: A New Approach to Insider Risk Monitoring
A question our customers commonly ask is whether our InTERCEPT insider risk management platform is agent-based or agentless. The…
Read MoreDTEX EDR Integrations: The Next Partner Opportunity
In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact,…
Read MoreClosing the Trust-Risk Loop with File Lineage
The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike…
Read MoreData loss Prevention Best Practices for Employee Layoffs
Seemingly every day, we receive news of another company retrenching and laying off several hundred people. These actions can…
Read More2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration
Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…
Read MoreGlobal Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale
The financial services sector is prone to insider abuse and data misuse, including fraud. For global banks and other…
Read MoreCase Study: DTEX Provides Visibility and Context to Global Materials Company
A global materials science company that invests heavily in research and holds thousands of patents worldwide realized it needed a…
Read MoreCrawl, Walk, Run: How to Kickstart your Insider Risk Program
Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing…
Read MoreWhy Understanding Risk is Key to Cyber Resilience
Cyber resilience is the next frontier of cybersecurity, as organisations increasingly focus on mitigation with the sober acceptance that a…
Read MoreBalancing Security and Privacy to Protect a Global Manufacturer from Insider Risk
Protecting sensitive data from insider threats is a board-level issue in companies today. This is particularly true when an innovative…
Read MoreCase Study: DTEX Helps a Global Financial Services Institution Mitigate Insider Threats
Insider threats are a problem for almost every industry, but financial services companies have always been—and will continue to…
Read More