Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More

July 22, 2020 | DTEX Systems

New Dtex Intercept 6.0 Puts Human Element at the center of Next-Gen Insider Threat Management

Investments in point solutions and reliance on modules from SIEM and EPP platforms are falling short as evidenced by the…

Read More

May 6, 2020 | DTEX Systems

Dtex Announces $17.5M Funding led by Northgate Capital

The widespread decision corporations have made to allow employees to WFH is a great thing – both for business and…

Read More

November 20, 2019 | DTEX Systems

Analyst Breach Insights, Week of November 20: Undetected Breaches, Accidental Exposure, and VPN Risks

In this week’s analyst breach insights, we discuss four of the breaches in last week’s news, which will lead us…

Read More

September 13, 2019 | DTEX Systems

Decoding Context: Introducing the Insider Threat Kill Chain Video Course

We are extremely excited to announce that we have officially kicked off our first ever multi-part video course, “The Key…

Read More

July 29, 2019 | DTEX Systems

Developing a Modern Path Forward for Insider Threat Detection in Federal Organizations

Today, we were very pleased to announce that Dtex has officially received a US Department of Defense Authority to Operate.

Read More

April 23, 2019 | DTEX Systems

Microsoft Hack an Example of Insider Threat? Yes. TransUnion Gets Serious About Insider Threat

Insider threat or not? That seems to be the questions surrounding a recent breach that struck Microsoft between January and…

Read More

April 16, 2019 | DTEX Systems

News Reveals Critical Role Evidence Gathering Plays in Insider Threat Defense; Fifth Annual Insider Threat Summit this Week

There have been several interesting events that have taken place in the insider threat space over the past week that…

Read More

April 9, 2019 | DTEX Systems

Negligent Insider Threats Dominate, Malicious Still Need Attention; Dtex to Present at Insider Threat Summit

Dtex Systems VP of federal David Wilcox will be presenting at the Insider Threat Summit. Attendees will have an opportunity…

Read More

April 1, 2019 | DTEX Systems

Headlines Show How Endpoint Detection, Forensics Stop and Convict Insider Threats

Over the past several weeks, we’ve seen several examples of how insider threats have been detected, arrested and successfully prosecuted.

Read More

March 25, 2019 | DTEX Systems

This Week's Insider Threat News Trends: How to Scale Detection, Negligent Exposures, Malicious Intent

There is no shortage of cybersecurity offerings that can detect, prevent and mitigate problems. One of the challenges organizations face…

Read More

March 19, 2019 | DTEX Systems

Media Attention Stays Focused on Insider Threat, Byline by Dtex Insider Threat Specialist Katie Burnell Explains What It All Means

The cybersecurity news media’s attention remains focused on the insider threat, especially on the data breaches, leaks and exposures caused…

Read More

March 13, 2019 | DTEX Systems

Introducing the 2019 Insider Threat Intelligence Report

We recently hit an exciting milestone here at Dtex: the release of our 2019 Insider Threat Intelligence Report. Published annually,…

Read More