Splunk & DTEX Partner to Deliver Noise-free Human Telemetry to the SOC. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

August 27, 2021 | Armaan Mahbod

Stories from the Field – Unusual Insider Activity: Not Always Malicious

Working with DTEX customers is incredibly rewarding – I’ve helped security teams identify and thwart numerous malicious insiders and prevent…

Read More

August 11, 2021 | Jonathan Daly

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were…

Read More

August 4, 2021 | Jonathan Daly

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they…

Read More

July 23, 2021 | Jonathan Daly

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user…

Read More

July 15, 2021 | Jonathan Daly

VicTrack & DTEX: Security Product for Business Continuity Planning?

Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits…

Read More

July 7, 2021 | Jonathan Daly

What Is a Next-Gen Insider Threat Solution?

Historically, insider threat management took the form of “point solutions" for specific issues. Today, a next-gen product must address genuine…

Read More

June 1, 2021 | Jonathan Daly

DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

August 27, 2021 | Armaan Mahbod

Stories from the Field – Unusual Insider Activity: Not Always Malicious

Working with DTEX customers is incredibly rewarding – I’ve helped security teams identify and thwart numerous malicious insiders and prevent…

Read More

August 11, 2021 | Jonathan Daly

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were…

Read More

August 4, 2021 | Jonathan Daly

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they…

Read More

July 23, 2021 | Jonathan Daly

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user…

Read More

July 15, 2021 | Jonathan Daly

VicTrack & DTEX: Security Product for Business Continuity Planning?

Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits…

Read More

July 7, 2021 | Jonathan Daly

What Is a Next-Gen Insider Threat Solution?

Historically, insider threat management took the form of “point solutions" for specific issues. Today, a next-gen product must address genuine…

Read More

June 9, 2021 | Jay Manni

What Is User & Entity Behavior Analytics (UEBA)?

Learn what is User & Entity Behavior Analytics (UEBA) alongside the differences between outdated Indicators of Compromise vs. modern Indicators…

Read More

June 1, 2021 | Jonathan Daly

DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…

Read More

May 24, 2021 | Jonathan Daly

Workforce Cyber Intelligence 106: Nine Workforce Cyber Intelligence Use Cases

Explore how Workforce Cyber Intelligence, a novel approach to learning from employees that enables informed business decisions, through nine use…

Read More

May 17, 2021 | Jonathan Daly

Workforce Cyber Intelligence 105: Improving Operational Efficiency with Workforce Visibility

We previously explored protection that Workforce Cyber Intelligence provides employers & employees. Now, learn how Workforce Visibility improves Operational Efficiency.

Read More

May 4, 2021 | Jonathan Daly

Workforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats

Behavior analysis and workforce monitoring can coexist and even flourish alongside privacy and security to detect malicious insiders. This blog…

Read More

April 29, 2021 | Rajan Koo

Williams Racing Protects Culture & Data with Privacy-first Approach to Insider Threat Mitigation

Insider Threat protection is a top concern for IP-rich organizations like Williams Racing. Learn how they use DTEX to mitigate…

Read More