WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreGartner® Market Guide for DLP | Why Context is King
With insider risk rising and becoming increasingly expensive, it’s becoming more incumbent on companies to figure out how they want…
Read More7 Reasons to Ditch Endpoint DLP for Endpoint Visibility
Companies really don't have any business collecting or managing.
Read MoreData loss Prevention Best Practices for Employee Layoffs
Seemingly every day, we receive news of another company retrenching and laying off several hundred people. These actions can…
Read More2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration
Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one…
Read MoreDTEX InTERCEPT Named Winner in 2023 Cybersecurity Excellence Awards
We are thrilled to share that DTEX InTERCEPT was named a winner in the 2023 Cybersecurity Excellence Awards for the…
Read MoreWhat is Data Loss Prevention?
Data Loss Prevention, commonly referred to as DLP, refers to policies, technologies, and controls used by organizations to prevent accidental…
Read MoreGlobal Security Leader Selects DTEX to Manage Insider Risk
In this new era of hybrid work, visibility into user behavior and actions is critical to thwarting insider threats and…
Read MoreInsider Risk: When Business Gets Personal
In an ideal world, there is a clear delineation of where personal and professional engagements take place: anything business related…
Read MoreMajor US Lending Company Chooses DTEX to Mitigate Insider Risk
Insider risk is fast becoming a top priority for many enterprise organizations, particularly those in critical infrastructure industries. At…
Read MoreData Exfiltration Prevention: A How-To Guide
The most common goal of malicious insiders is stealing (or data exfiltrating) sensitive data by copying, transferring, emailing, or printing…
Read MoreWhy Understanding Risk is Key to Cyber Resilience
Cyber resilience is the next frontier of cybersecurity, as organisations increasingly focus on mitigation with the sober acceptance that a…
Read MoreBalancing Security and Privacy to Protect a Global Manufacturer from Insider Risk
Protecting sensitive data from insider threats is a board-level issue in companies today. This is particularly true when an innovative…
Read More