WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreStandardizing Data: How OCSF Supports Proactive Insider Risk Management
When it comes to the data quotient of insider risk management, quality triumphs volume. Having actionable data from inputs spanning…
Read MoreDTEX and Netskope: Mitigating Insider Risk with Managed AND Unmanaged Devices
Insider risk teams face many challenges, but a common challenge I hear about is this: How can you enforce your…
Read MoreThe Psychology of Insider Risk Management
In the second episode of Conversations from the Inside: The Psychology of Insider Risk Management: Time and Place Matters, renowned…
Read MorePentagon Compromise | The Most Effective Insider Threat Sensors Are People
DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…
Read MoreAccelerating Insider Risk Management in the Mining Sector: Case Study
Over the past few years, insider risk management has become a top priority for critical infrastructure organizations. Organizations in…
Read MoreBuilding a Human-Centric Insider Risk Program | Three Experts Weigh In
Building a human-centric insider risk program has become a key priority for most federal and critical infrastructure organizations. But how…
Read MoreInsider Risk Mitigation Strategies for the Midsize Enterprise
What do employees, contractors and integrated third-party partners have in common? They all represent insider risk. Regardless of malicious or…
Read MoreInsider Risk Management Best Practices | Forrester Report
Forrester has released its Best Practices: Insider Risk Management Report. The report is designed to help companies understand the…
Read MoreDTEX InTERCEPT and Microsoft 365 E5: The Partner Opportunity
For the past 20 years I have worked for multiple security start-ups, primarily in the endpoint space. In my interviews…
Read MoreCyberBytes Recap: The Insider Threat and the Real Risk to Enterprises
I recently sat down with CyberBytes podcast host and co-founder of Aspiron Search Joseph Cooper to discuss the insider…
Read MoreInsider Risk Management | Why You Need an Employee Assistance Program
There is no debate, regardless of sector, that an organization’s most valuable resource is its people. It makes sense then…
Read MoreDTEX and Microsoft 365 E5 | Powering Next Gen Insider Risk Management
DTEX and Microsoft are proven tech players in their own right. But together, they take insider risk management to…
Read More