Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
insider threats in healthcare HHS

April 28, 2022 | DTEX Systems

A New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare

Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…

Read More
Super Malicious Insider Q&A image

April 7, 2022 | Armaan Mahbod

DTEX i3 Team Q&A: The Super Malicious Insider

Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…

Read More
compliance with check mark and other regulations insider risk management blog post

February 3, 2022 | DTEX Systems

Compliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring

Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…

Read More
two people looking at computer insider risk solution landscape blog post

January 18, 2022 | DTEX Systems

Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors

Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…

Read More
man programming on computer

November 22, 2021 | Rajan Koo

DTEX Systems Offers NGAV Customers Access to Zero Trust DLP & Human Forensic Telemetry via the CrowdStrike Falcon Platform

If the last 20+ years of cyberattacks have taught us anything, it is that humans are both an enterprise’s greatest…

Read More

November 19, 2021 | DTEX Systems

Getting DLP Right: Considering Gartner’s Thoughts on the Four Elements of a Successful DLP Program

The DLP struggle is real according to Andrew Bales, Associate Principal Analyst with Gartner. So real in fact…

Read More

November 16, 2021 | DTEX Systems

Top Challenges to Managing Insider Threats

In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…

Read More

November 11, 2021 | Andy London

Zero Trust DLP—A Knock-out Punch for Legacy DLP and UEBA?

Knock, knock. Who’s there? The future? The future who? The future of people-centric data loss prevention. Wake up people! It’s…

Read More

November 9, 2021 | DTEX Systems

How to Determine What Data to Protect and Who to Protect It From

We had the opportunity to moderate an incredibly interesting panel discussion at the SANS Institute Forum back in September,…

Read More

November 4, 2021 | Rajan Koo

macOS Monterey Demonstrates Apple’s Commitment to User Privacy & Enterprise Workforce Security

On October 25, 2021 Apple released macOS Monterey, the 18th and current major release of macOS, Apple’s desktop operating…

Read More

August 11, 2021 | DTEX Systems

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were…

Read More

January 26, 2021 | DTEX Systems

The 5 Reasons Why Enterprises Are Upgrading to Modern Endpoint DLP

Companies worldwide have spent billions of dollars on first generation endpoint data loss prevention (DLP) technologies, hoping it would be…

Read More