Splunk & DTEX Partner to Deliver Noise-free Human Telemetry to the SOC. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

August 27, 2021 | Armaan Mahbod

Stories from the Field – Unusual Insider Activity: Not Always Malicious

Working with DTEX customers is incredibly rewarding – I’ve helped security teams identify and thwart numerous malicious insiders and prevent…

Read More

August 11, 2021 | Jonathan Daly

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were…

Read More

August 4, 2021 | Jonathan Daly

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they…

Read More

July 23, 2021 | Jonathan Daly

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user…

Read More

July 15, 2021 | Jonathan Daly

VicTrack & DTEX: Security Product for Business Continuity Planning?

Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits…

Read More

July 7, 2021 | Jonathan Daly

What Is a Next-Gen Insider Threat Solution?

Historically, insider threat management took the form of “point solutions" for specific issues. Today, a next-gen product must address genuine…

Read More

June 1, 2021 | Jonathan Daly

DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

March 25, 2019 | Jonathan Daly

This Week's Insider Threat News Trends: How to Scale Detection, Negligent Exposures, Malicious Intent

There is no shortage of cybersecurity offerings that can detect, prevent and mitigate problems. One of the challenges organizations face…

Read More

March 19, 2019 | Jonathan Daly

Media Attention Stays Focused on Insider Threat, Byline by Dtex Insider Threat Specialist Katie Burnell Explains What It All Means

The cybersecurity news media’s attention remains focused on the insider threat, especially on the data breaches, leaks and exposures caused…

Read More

March 13, 2019 | Jonathan Daly

Introducing the 2019 Insider Threat Intelligence Report

We recently hit an exciting milestone here at Dtex: the release of our 2019 Insider Threat Intelligence Report. Published annually,…

Read More

March 11, 2019 | Jonathan Daly

Negligent Insider Threat Tops News Radars, Walmart Insiders Get More Than They Bargained For

Last week security researcher Bob Diachenko of Security Discovery revealed that he identified 800 million unprotected records stored in a…

Read More

March 6, 2019 | Jonathan Daly

Dtex Annual RSA Event Brings Attention to the Insider Threat, SC Magazine People Problem Focus Draws on Dtex Customer Expertise, RSA Blog Points out that Insider Threat is Changing Security Landscape

RSA, RSA, RSA, it’s all about RSA Conference 2019 this week, for sure. To kick it off, Dtex hosted its…

Read More

February 26, 2019 | Jonathan Daly

2/25/2019: Dtex, Insider Threat, Privacy New & Analysis: Gartner's Litan Calls Out Dtex as Missing Piece in Corporate Security, Dtex Threat Analyst Team Earns Top Honor

The Dtex 2019 Insider Threat Intelligence Report continues to drive headlines, especially around the role negligent users play in causing…

Read More

February 21, 2019 | Jonathan Daly

2/20/2019: Dtex, Insider Threat, Privacy News and Analysis Blog: The 2019 Dtex Insider Threat Intelligence Report; Product Announcement Highlights Advances in Privileged User Visibility, Enterprise Scalability

Today, we published the third annual Dtex Insider Threat Intelligence Report, now regarded as the industry standard for identifying insider…

Read More

February 11, 2019 | Jonathan Daly

2/11/2019: Dtex, Insider Threat, Privacy News Roundup & Analysis: VPN Usage Can Signal Insider Threats, Spies. Okta Says Enterprise Employees Use Hundreds of Apps, Are They Secure? US Adopts AI Strategy

Last week, Australian law enforcement authorities arrested and charged Chinese National Yi “Paulsson” Zheng for illegally downloading and possessing confidential…

Read More

February 7, 2019 | Dtex Systems

Breaking Insider Threat News: Dtex Detects Chinese National Yi Zheng's Attempt to Steal Data From Major Financial Services Provider

Wealth management company AMP, based in Australia and New Zealand, told The Australian that the Dtex Advanced Enterprise DMAP Intelligence…

Read More

February 4, 2019 | Dtex Systems

2/4/2019: Dtex, Insider Threat, Privacy in the News: The Good, The Bad, The Ugly; Major Critical Infrastructure Owner Faces $10M Penalty; Insider Threat Tainting Water Supply

At the end of last week, we published "Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees." The…

Read More

January 29, 2019 | Jonathan Daly

1/28/2018 Dtex, Insider Threat, Privacy in the News: xDedic Takedown Highlights Stolen Credential Epidemic, National Intelligence Strategy Emphasizes Insider Threat, Happy Data Privacy Day!

Compromised credential fraud is trending in the news. This time, it's due to the US Department of Justice (DOJ) announcement…

Read More

January 22, 2019 | Jonathan Daly

1/22/2019 Dtex, Insider Threat, Privacy in the News: Exposed Data in the Cloud, Phishing, Insider Evasion, Privacy Regulation Dominates Insider Threat News Cycle

There’s no shortage of information available about the insider threat types that public and private sector organizations are forced to…

Read More