Splunk & DTEX Partner to Deliver Noise-free Human Telemetry to the SOC. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

October 26, 2021 | Jonathan Daly

What is Zero Trust? Three Things to Keep in Mind as Your Organization Works Towards Developing This Mindset

The term ‘Zero Trust’ has been a popular concept in cybersecurity for some time, but the transition to remote and…

Read More

September 30, 2021 | Jane Wong, Vice President of Security Products, Splunk, Inc.

Splunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise

The decentralization of the modern enterprise — and the digital empowerment of the insider — have since expanded the attack…

Read More

October 26, 2021 | Jonathan Daly

What is Zero Trust? Three Things to Keep in Mind as Your Organization Works Towards Developing This Mindset

The term ‘Zero Trust’ has been a popular concept in cybersecurity for some time, but the transition to remote and…

Read More

October 21, 2021 | Armaan Mahbod

CISA Warns of Water, Wastewater Infrastructure Security Threats on Heels of Insider Threat Self-Assessment Tool Release

On Thursday, October 14th the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National…

Read More

October 19, 2021 | Jonathan Daly

The Seven Ways Equinix is Plugging the Holes in NGAV with DTEX

Next-Gen Antivirus (NGAV) technology has greatly improved many organizations’ abilities to detect, identify and stop malware from infecting their endpoints,…

Read More

October 7, 2021 | Jonathan Daly

The Facebook Whistleblower and the Insider Threat Kill Chain

The reverberations from Facebook whistleblower Frances Haugen’s campaign will be felt for months to come. While the focus needs to…

Read More

September 30, 2021 | Jane Wong, Vice President of Security Products, Splunk, Inc.

Splunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise

The decentralization of the modern enterprise — and the digital empowerment of the insider — have since expanded the attack…

Read More

August 27, 2021 | Armaan Mahbod

Stories from the Field – Unusual Insider Activity: Not Always Malicious

Working with DTEX customers is incredibly rewarding – I’ve helped security teams identify and thwart numerous malicious insiders and prevent…

Read More

August 11, 2021 | Jonathan Daly

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were…

Read More

August 4, 2021 | Jonathan Daly

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they…

Read More

July 23, 2021 | Jonathan Daly

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user…

Read More

July 15, 2021 | Jonathan Daly

VicTrack & DTEX: Security Product for Business Continuity Planning?

Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits…

Read More

July 7, 2021 | Jonathan Daly

What Is a Next-Gen Insider Threat Solution?

Historically, insider threat management took the form of “point solutions" for specific issues. Today, a next-gen product must address genuine…

Read More

June 1, 2021 | Jonathan Daly

DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…

Read More