WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreConversations from the Inside: Insider Risk Meets Counterintelligence
DTEX is proud to have sponsored the first videocast episode of Conversations from the Inside: A Sit-Down with the…
Read MoreDTEX Systems and GuidePoint Security Expand Insider Risk Partnership
We are excited to officially announce that DTEX Systems is joining GuidePoint Security’s Emerging Cyber Vendor Program. As part…
Read MorePeople: The Nuclei of Your Insider Risk Management Solution
Every company has them, some more than others. They are at home, across the seas, or down the hall. I…
Read MoreDTEX EDR Integrations: The Next Partner Opportunity
In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact,…
Read MoreInsider Risk Legislation is Coming: Are You Prepared?
The rise of foreign interference and high-profile breaches has highlighted the need to address the human element in cybersecurity through…
Read MoreInsider Risk vs. Insider Threat: What's the Difference?
Earlier this year we published our 2023 Insider Risk Investigations Report and took care to ask the question, what…
Read MorePreventing Insider Threats in Pharma: Case Study
Preventing insider threats in the pharmaceutical industry is no small feat. As providers of life-changing medicines, pharmaceutical companies must…
Read MoreA Communications Framework for Insider Risk Management
The Insider Risk Management (IRM) world is filled with buzzwords. Phrases like “insider threat”, “the human element”, “zero trust”…
Read MoreProactive Insider Risk Management | A Case for Technology Consolidation
It is often said that any insider risk program must have a technology component to be effective in today’s enterprise…
Read MoreInsider Risk Resolution: A Decision Tree Framework
Data loss from employees is an increasing concern for enterprise organizations and federal entities. Findings from the DTEX i3…
Read MoreDTEX Insider Risk Assessment Development Strategy for Partners
DTEX offers partners an opportunity to provide insider risk management services to customers with an easy assessment to get started.
Read MoreClosing the Trust-Risk Loop with File Lineage
The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike…
Read More