WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreNew Dtex Intercept 6.0 Puts Human Element at the center of Next-Gen Insider Threat Management
Investments in point solutions and reliance on modules from SIEM and EPP platforms are falling short as evidenced by the…
Read MoreDtex Announces $17.5M Funding led by Northgate Capital
The widespread decision corporations have made to allow employees to WFH is a great thing – both for business and…
Read MoreAnalyst Breach Insights, Week of November 20: Undetected Breaches, Accidental Exposure, and VPN Risks
In this week’s analyst breach insights, we discuss four of the breaches in last week’s news, which will lead us…
Read MoreDecoding Context: Introducing the Insider Threat Kill Chain Video Course
We are extremely excited to announce that we have officially kicked off our first ever multi-part video course, “The Key…
Read MoreDeveloping a Modern Path Forward for Insider Threat Detection in Federal Organizations
Today, we were very pleased to announce that Dtex has officially received a US Department of Defense Authority to Operate.
Read MoreMicrosoft Hack an Example of Insider Threat? Yes. TransUnion Gets Serious About Insider Threat
Insider threat or not? That seems to be the questions surrounding a recent breach that struck Microsoft between January and…
Read MoreNews Reveals Critical Role Evidence Gathering Plays in Insider Threat Defense; Fifth Annual Insider Threat Summit this Week
There have been several interesting events that have taken place in the insider threat space over the past week that…
Read MoreNegligent Insider Threats Dominate, Malicious Still Need Attention; Dtex to Present at Insider Threat Summit
Dtex Systems VP of federal David Wilcox will be presenting at the Insider Threat Summit. Attendees will have an opportunity…
Read MoreHeadlines Show How Endpoint Detection, Forensics Stop and Convict Insider Threats
Over the past several weeks, we’ve seen several examples of how insider threats have been detected, arrested and successfully prosecuted.
Read MoreThis Week's Insider Threat News Trends: How to Scale Detection, Negligent Exposures, Malicious Intent
There is no shortage of cybersecurity offerings that can detect, prevent and mitigate problems. One of the challenges organizations face…
Read MoreMedia Attention Stays Focused on Insider Threat, Byline by Dtex Insider Threat Specialist Katie Burnell Explains What It All Means
The cybersecurity news media’s attention remains focused on the insider threat, especially on the data breaches, leaks and exposures caused…
Read MoreIntroducing the 2019 Insider Threat Intelligence Report
We recently hit an exciting milestone here at Dtex: the release of our 2019 Insider Threat Intelligence Report. Published annually,…
Read More