WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreInsider Threat Challenges, Lessons Learned and Opportunities
News headlines this week focus on challenges, opportunities and lessons learned as organizations grapple with insider threats.
Read MoreCanadian Financial Institution Victim of Insider Threat; Data Leakage Ranks as Top Cloud Security Concern
Security-related news last week detailed how a Canadian financial institution fell victim to an insider threat and highlighted two recent…
Read MoreComplex Threats like Credential Stuffing on the Rise; Incident Response is Weak Link in Mitigating Cyber Risk
As businesses work hard to close security gaps, this week's news headlines highlight the challenges of defending against complex threats…
Read MoreCatching Complex Threats: The Rise of Credential Stuffing
The number of attack vectors and exploitation methods that organizations must address grows exponentially everyday. One such vector that has…
Read MorePoor Cloud Security Practices Put Data at Risk; A Detailed Look at How Hackers Target Employees
Security news coverage from the past week underscores how poor cloud security practices are putting organizations - and their sensitive…
Read MoreNew Industry Research Underscores Dangers Associated with Employee Errors, Misused or Abused Privileged Access
A slew of industry reports published over the last week highlight the security risks associated with employee errors and poor…
Read MoreSnapchat Report Highlights Insider Threats as Top Challenge for Privacy; Employee Mistakes Named Top Data Security Threat in Hong Kong and Taiwan
News headlines this week reveal employee data abuse at Snapchat, highlighting the insider threat as a top challenge for data…
Read MoreAustralian Government IT Worker Runs Illegal Cryptomining Operation at Work; Cloud Migration Brings Increased Insider Threat Risk
Headlines from the past week focus on an Australian government IT contractor arrested on suspicion of running an illegal cryptocurrency…
Read MoreSamsung hit with data spill, exposed credentials; Former worker intentionally damages Oregon Medicaid System
Last week's news headlines reveal sensitive source code, credentials, and data were leaked at a Samsung development lab and a…
Read MoreHelping Law & Finance Firms Proactively Manage Insider Threats; April Security Research Roundup
Industry coverage focuses on how legal and finance organizations can proactively manage insider threats, as well as recent security research.
Read MoreCasual Employee Attitudes Equal Security Risks; Healthcare Joins Manufacturing as Industry Plagued by Insider Threats
Industry reports highlight the plethora of challenges organizations are facing - across industries - when it comes to managing insider…
Read MoreFull Visibility and the Insider Threat Kill Chain: Why it is Critical to See Every Stage
The risks associated with those inside of the organization are widely acknowledged, well-documented, and increasingly prioritized. Yet, a formidable challenge…
Read More