Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

INSIDER RISK INSIGHTS, NEWS, AND ANALYSIS

BLOG

Insider Risk Insights - DTEX Blog

The Latest Insider Risk Insights

User Behavior Analytics Why False Positives are NOT the Problem

May 7, 2024 | Christopher Burgess

User Behavior Analytics: Why False Positives are NOT the Problem

The axiom “garbage in, garbage out” has been around since the early days of computer science and remains apropos today…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
The Rise of AI and Blended Attacks Key Takeaways from 2024 RSAC

May 15, 2024 | Kellie Roessler

The Rise of AI and Blended Attacks: Key Takeaways from RSAC 2024

The 2024 RSA Conference can be summed up in two letters: AI. AI was everywhere. It was the main topic…

Read More
User Behavior Analytics Why False Positives are NOT the Problem

May 7, 2024 | Christopher Burgess

User Behavior Analytics: Why False Positives are NOT the Problem

The axiom “garbage in, garbage out” has been around since the early days of computer science and remains apropos today…

Read More
DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More
Potential Risk Indicator Decay and Insider Risk Management

April 17, 2024 | Christopher Burgess

Potential Risk Indicator Decay and Insider Risk Management

Who among us hasn’t received an answer to what we thought was a precise question with, “it depends” and our…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
Insider Threat Summit (ITS8) 2024 Three Takeaways

April 4, 2024 | Erin Winchester

Insider Threat Summit (ITS8) 2024: Three Takeaways

The 8th Annual Insider Threat Summit (ITS) wrapped up last week in Monterey, California, and once again…

Read More
Zero Trust Meets Insider Risk Management

March 28, 2024 | Kellie Roessler

Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in…

Read More
DTEX i³ Threat Advisory Multiple Identities

March 12, 2024 | Kellie Roessler

DTEX i³ Issues Threat Advisory for Detecting the Use of Multiple Identities

The DTEX i3 team has issued a new Threat Advisory following recent investigations linking the use of multiple personal accounts…

Read More
The Proactive Power of Tabletop Exercises in Insider Risk Management

March 6, 2024 | Christopher Burgess

The Proactive Power of Tabletop Exercises in Insider Risk Management

As the adage goes, “practice makes perfect.” To get as close to perfection as possible in any endeavor, one must…

Read More
Early insider risk detection hinges on quality data

February 27, 2024 | Kellie Roessler

Early Insider Risk Detection Hinges on Quality Data – Not AI

DTEX recently became the first cybersecurity company to launch a dedicated AI assistant specifically for insider risk…

Read More
AI image colorful

February 12, 2024 | Erin Winchester

Meet Ai³, the First AI Assistant Created for Insider Risk Management

Our generative AI risk assistant for DTEX InTERCEPT fast-tracks effective insider investigations and decision making and helps to prevent data…

Read More
DTEX i³ reveals vulnerabilities and mitigations associated with common workforce web applications

January 30, 2024 | Kellie Roessler

DTEX i³ Issues Threat Advisory for Mitigating Insider Abuse of Insecure Web Apps

Web applications offer powerful workforce efficiencies, but they are not without their risks. Misconfiguration of web applications can open the…

Read More