WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreStories from the Field – Unusual Insider Activity: Not Always Malicious
Working with DTEX customers is incredibly rewarding – I’ve helped security teams identify and thwart numerous malicious insiders and prevent…
Read MoreSmile, You’re On Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed
The Verkada breach raises concerns about the need for human-centric cyber security intelligence that prioritizes privacy while protecting corporate IP.
Read MoreHarris Poll Shows How To Gain Employee Support for Monitoring Programs and Avoid Privacy Invasions
All too often, privacy and security are portrayed as at odds with each other. There was a time when this…
Read More