WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreA New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare
Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…
Read MoreDTEX i3 Team Q&A: The Super Malicious Insider
Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…
Read MoreCompliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring
Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…
Read MoreUnderstanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors
Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…
Read MoreDTEX Systems Offers NGAV Customers Access to Zero Trust DLP & Human Forensic Telemetry via the CrowdStrike Falcon Platform
If the last 20+ years of cyberattacks have taught us anything, it is that humans are both an enterprise’s greatest…
Read MoreGetting DLP Right: Considering Gartner’s Thoughts on the Four Elements of a Successful DLP Program
The DLP struggle is real according to Andrew Bales, Associate Principal Analyst with Gartner. So real in fact…
Read MoreTop Challenges to Managing Insider Threats
In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…
Read MoreZero Trust DLP—A Knock-out Punch for Legacy DLP and UEBA?
Knock, knock. Who’s there? The future? The future who? The future of people-centric data loss prevention. Wake up people! It’s…
Read MoreHow to Determine What Data to Protect and Who to Protect It From
We had the opportunity to moderate an incredibly interesting panel discussion at the SANS Institute Forum back in September,…
Read MoremacOS Monterey Demonstrates Apple’s Commitment to User Privacy & Enterprise Workforce Security
On October 25, 2021 Apple released macOS Monterey, the 18th and current major release of macOS, Apple’s desktop operating…
Read MoreThe Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches
In a year full of company milestones, it’s not surprising that we have more great news to share. We were…
Read MoreThe 5 Reasons Why Enterprises Are Upgrading to Modern Endpoint DLP
Companies worldwide have spent billions of dollars on first generation endpoint data loss prevention (DLP) technologies, hoping it would be…
Read More