DTEX InTERCEPT for Critical Infrastructure Entities Enhanced. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

May 4, 2021 | Jonathan Daly

Workforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats

Behavior analysis and workforce monitoring can coexist and even flourish alongside privacy and security to detect malicious insiders. This blog…

Read More

April 29, 2021 | Rajan Koo

Williams Racing Protects Culture & Data with Privacy-first Approach to Insider Threat Mitigation

Insider Threat protection is a top concern for IP-rich organizations like Williams Racing. Learn how they use DTEX to mitigate…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

January 26, 2021 | Jonathan Daly

The 5 Reasons Why Enterprises Are Upgrading to Modern Endpoint DLP

Companies worldwide have spent billions of dollars on first generation endpoint data loss prevention (DLP) technologies, hoping it would be…

Read More

April 29, 2021 | Rajan Koo

Williams Racing Protects Culture & Data with Privacy-first Approach to Insider Threat Mitigation

Insider Threat protection is a top concern for IP-rich organizations like Williams Racing. Learn how they use DTEX to mitigate…

Read More

April 9, 2021 | Jonathan Daly

DTEX InTERCEPT Named Gold Winner for Cybersecurity Excellence Awards in Insider Threat Solution Category

DTEX InTERCEPT was named a Gold Winner in the Insider Threat category for the 2021 Cybersecurity Excellence Product/Service Awards.

Read More

April 7, 2021 | Jay Manni

Layers and Telemetry -- What We Can Learn from the Stanford University Breach

DTEX VP of Product Engineering explores why breaches like the Stanford University breach continue to happen.

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More
Best Practices for Insider Threat Program

March 19, 2021 | Jonathan Daly

New Forrester Research says ‘Motivations & Indicators’ are Key to Mitigating Insider Threats

The latest research from Forrester offers three key take-aways for security pro’s and outlines best practices for designing, implementing and…

Read More
insider threat analyst

March 11, 2021 | Lynsey Wolf

10 Tips to Strengthen Your Insider Threat Program – Privacy, Policy, Performance [Part 2]

Read this blog post by Lynsey Wolf for 5 more tips on strengthening your Insider Threat Program to prevent data…

Read More
Insider Threat Program Analyst at Work

March 9, 2021 | Lynsey Wolf

10 Tips to Strengthen Your Insider Threat Program – Data, Intent and Context [Part 1]

When building an insider threat program, the same 10 building blocks hold true for everyone. Read this blog post to…

Read More

January 29, 2021 | Jonathan Daly

Insider Risk Mitigation Strategies – New Gartner Market Guide

On December 29th Gartner analysts Jonathan Care, Brent Predovich, and Paul Furtado published the first ever Market Guide on Insider Risk…

Read More
insider threat at Tesla

January 26, 2021 | Jonathan Daly

Insiders Strike Again at Tesla… or did they?

News broke on January 22 that Tesla has filed a federal lawsuit accusing Alex Khatilov of stealing upwards of 26,000…

Read More

November 12, 2020 | Rajan Koo

2020 Insider Threat Report - Conclusion

The 2020 DTEX Insider Threat Report shows that the Work From Home movement has helped reveal a blind spot in…

Read More

November 10, 2020 | Rajan Koo

The Insider Threat Kill Chain – Obfuscation

In cybersecurity, the kill chain refers to the sequential steps an adversary must complete in a successful attack. Stopping the…

Read More

October 22, 2020 | Rajan Koo

The Insider Threat Kill Chain - Aggregation

In the previous postings on the Insider Threat Kill Chain we covered how malicious insiders (whether persistent insider threats or…

Read More