Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
cybersecurity tips for online shopping mother's day blog post

May 6, 2022 | Armaan Mahbod

Protect Your Data: Cyber Security Tips for Online Shopping This Mother’s Day

In this blog, we frequently focus on how organizations can protect against malicious insider threats. However, we haven’t forgotten about…

Read More
cybersecurity career tips 2022

April 12, 2022 | Mohan Koo

3 Ways to Take Control of Your Cyber Security Career in 2022

As the cyber security landscape continues to transform before our eyes, it’s becoming increasingly evident that we can no longer…

Read More
Super Malicious Insider Q&A image

April 7, 2022 | Armaan Mahbod

DTEX i3 Team Q&A: The Super Malicious Insider

Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…

Read More
world backup day best practices for insider risk management

March 31, 2022 | DTEX Systems

World Backup Day: How Insider Threats Intersect with Data Backup and Best Practices for Insider Risk Management

World Backup Day is a great time to review the basics of backing up data, and looking ahead to…

Read More
fingers typing on computer criminal activity on corporate device insider risk management

January 20, 2022 | Armaan Mahbod

Stories from the Field: How DTEX i3 Identified Personal Criminal Activity on a Corporate Device

When sports started being televised 50+ years ago, it brought a new level of visibility to teams and games. You…

Read More

June 1, 2021 | DTEX Systems

DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…

Read More

December 19, 2019 | DTEX Systems

Analyst Breach Insights, Week of December 19: Looking Back on 2019 and Forward to 2020 and Beyond

At long last, the end of a year -- and a decade! -- looms, and a new one is practically…

Read More

November 26, 2019 | DTEX Systems

Analyst Breach Insights Week of November 26: Macy’s Breach(es), the Definition of Insanity, and Breaking the Cycle

In this week’s Analyst Breach Insights, we’re discussing Macy’s recent data breach, as well as the broader question: why is…

Read More

November 20, 2019 | DTEX Systems

Analyst Breach Insights, Week of November 20: Undetected Breaches, Accidental Exposure, and VPN Risks

In this week’s analyst breach insights, we discuss four of the breaches in last week’s news, which will lead us…

Read More

November 14, 2019 | DTEX Systems

Analyst Breach Insights Week of November 14: Dissecting the Trend Micro Insider Breach

In this week’s analyst breach report, we’re taking a look at on one particularly interesting breach that happened last week…

Read More

November 6, 2019 | DTEX Systems

Announcing Weekly Breach Insights from Dtex Analysts: Week of November 6

We’re thrilled to kick off our first installment of our weekly Analyst Breach Insights series. In these posts, we’ll be…

Read More

February 8, 2019 | DTEX Systems

Insider Threat Analyst Files 2/8/2019: VPN, A Double-Edged Sword? Analysis of US Sens. Rubio, Wyden VPN National Security Warning

Yesterday, US Senators Ron Wyden and Marco Rubio issued a letter expressing their concern over national security issues that Virtual…

Read More