WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreWhy You Need a Multi-national IRM Program
Insider Risk or Threat Management (IRM) programs are quickly becoming a must-have for global organizations and enterprises. The risk…
Read MorePrivacy Makes all the Difference: Insider Risk Management and Insider Threat Surveillance
As insider risks, whether born from negligence, external intimidation, or true malicious internal threats, grow, organizations need to take steps…
Read MoreInsider Risk Management or Insider Threat Surveillance?
The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…
Read MoreA New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare
Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…
Read MoreEmployee Stress & Insider Threats: How to Mitigate Risk from a Security & HR Standpoint
April is Stress Awareness Month. It’s been recognized as such since 1992, but given the events of the past…
Read MoreWhy Striking the Balance Between Insider Risk and Privacy is More Important Than Ever
The last three years have changed the workplace more than any other period in history. We’re now in a new…
Read MoreThe Great Data Infiltration of 2022—The Data You Don’t Want & Why
Sensitive Data and Infiltration Risk The Great Resignation picked up steam in 2021. According to the U.S. Bureau of…
Read MoreHow to Protect Your Work-From-Home Workforce—Examining Forrester Research’s Take
Not too long ago Heidi Shey of Forrester Research released her thoughts on how enterprises can best protect the…
Read MoreCompliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring
Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…
Read MoreThe Grinch of the Enterprise: Attackers That Take Advantage of Risky Employee Behaviors
With the holiday season upon us, it’s truly an incredible time of year. Folks are planning holiday get-togethers, searching for…
Read MoreHow to Determine What Data to Protect and Who to Protect It From
We had the opportunity to moderate an incredibly interesting panel discussion at the SANS Institute Forum back in September,…
Read MoreSplunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise
The decentralization of the modern enterprise — and the digital empowerment of the insider — have since expanded the attack…
Read More