WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreProtect Your Data: Cyber Security Tips for Online Shopping This Mother’s Day
In this blog, we frequently focus on how organizations can protect against malicious insider threats. However, we haven’t forgotten about…
Read More3 Ways to Take Control of Your Cyber Security Career in 2022
As the cyber security landscape continues to transform before our eyes, it’s becoming increasingly evident that we can no longer…
Read MoreDTEX i3 Team Q&A: The Super Malicious Insider
Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…
Read MoreWorld Backup Day: How Insider Threats Intersect with Data Backup and Best Practices for Insider Risk Management
World Backup Day is a great time to review the basics of backing up data, and looking ahead to…
Read MoreStories from the Field: How DTEX i3 Identified Personal Criminal Activity on a Corporate Device
When sports started being televised 50+ years ago, it brought a new level of visibility to teams and games. You…
Read MoreDTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices
While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…
Read MoreAnalyst Breach Insights, Week of December 19: Looking Back on 2019 and Forward to 2020 and Beyond
At long last, the end of a year -- and a decade! -- looms, and a new one is practically…
Read MoreAnalyst Breach Insights Week of November 26: Macy’s Breach(es), the Definition of Insanity, and Breaking the Cycle
In this week’s Analyst Breach Insights, we’re discussing Macy’s recent data breach, as well as the broader question: why is…
Read MoreAnalyst Breach Insights, Week of November 20: Undetected Breaches, Accidental Exposure, and VPN Risks
In this week’s analyst breach insights, we discuss four of the breaches in last week’s news, which will lead us…
Read MoreAnalyst Breach Insights Week of November 14: Dissecting the Trend Micro Insider Breach
In this week’s analyst breach report, we’re taking a look at on one particularly interesting breach that happened last week…
Read MoreAnnouncing Weekly Breach Insights from Dtex Analysts: Week of November 6
We’re thrilled to kick off our first installment of our weekly Analyst Breach Insights series. In these posts, we’ll be…
Read MoreInsider Threat Analyst Files 2/8/2019: VPN, A Double-Edged Sword? Analysis of US Sens. Rubio, Wyden VPN National Security Warning
Yesterday, US Senators Ron Wyden and Marco Rubio issued a letter expressing their concern over national security issues that Virtual…
Read More