DTEX InTERCEPT for Critical Infrastructure Entities Enhanced. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

May 4, 2021 | Jonathan Daly

Workforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats

Behavior analysis and workforce monitoring can coexist and even flourish alongside privacy and security to detect malicious insiders. This blog…

Read More

April 29, 2021 | Rajan Koo

Williams Racing Protects Culture & Data with Privacy-first Approach to Insider Threat Mitigation

Insider Threat protection is a top concern for IP-rich organizations like Williams Racing. Learn how they use DTEX to mitigate…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

January 26, 2021 | Jonathan Daly

The 5 Reasons Why Enterprises Are Upgrading to Modern Endpoint DLP

Companies worldwide have spent billions of dollars on first generation endpoint data loss prevention (DLP) technologies, hoping it would be…

Read More

May 4, 2021 | Jonathan Daly

Workforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats

Behavior analysis and workforce monitoring can coexist and even flourish alongside privacy and security to detect malicious insiders. This blog…

Read More

April 29, 2021 | Rajan Koo

Williams Racing Protects Culture & Data with Privacy-first Approach to Insider Threat Mitigation

Insider Threat protection is a top concern for IP-rich organizations like Williams Racing. Learn how they use DTEX to mitigate…

Read More
Employee Privacy and trust

April 21, 2021 | Jonathan Daly

Workforce Cyber Intelligence 103: The Importance of User Privacy & Trust

Dive deeper into one of the key pillars of Workforce Cyber Intelligence: privacy.

Read More

April 15, 2021 | Jonathan Daly

Workforce Cyber Intelligence 102: An Introduction to Workforce Cyber Intelligence

Dive deeper into workforce cyber intelligence and understand the shortcomings that this next generation technology helps address.

Read More

April 12, 2021 | Jay Manni

UEBA Redemption (Part 2): Behavioral Enrichment & Predictive Analytics

Learn how Behavioral Enrichment & Predictive Analytics help IT and SecOp pro’s answer questions like Who, What, When, Why, Where…

Read More

April 9, 2021 | Jonathan Daly

DTEX InTERCEPT Named Gold Winner for Cybersecurity Excellence Awards in Insider Threat Solution Category

DTEX InTERCEPT was named a Gold Winner in the Insider Threat category for the 2021 Cybersecurity Excellence Product/Service Awards.

Read More

April 7, 2021 | Jay Manni

Layers and Telemetry -- What We Can Learn from the Stanford University Breach

DTEX VP of Product Engineering explores why breaches like the Stanford University breach continue to happen.

Read More

April 5, 2021 | Jonathan Daly

Workforce Cyber Intelligence 101: An Overview

Learn about the components of "workforce cyber intelligence" and how it can enable you to empower and protect your employees…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

March 24, 2021 | Jay Manni

UEBA Redemption: Identifying Indicators of Intent

Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…

Read More
Best Practices for Insider Threat Program

March 19, 2021 | Jonathan Daly

New Forrester Research says ‘Motivations & Indicators’ are Key to Mitigating Insider Threats

The latest research from Forrester offers three key take-aways for security pro’s and outlines best practices for designing, implementing and…

Read More
Working at home with family

March 16, 2021 | Rajan Koo

Smile, You’re On Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed

The Verkada breach raises concerns about the need for human-centric cyber security intelligence that prioritizes privacy while protecting corporate IP.

Read More