DTEX InTERCEPT for Critical Infrastructure Entities Enhanced. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

April 7, 2021 | Jay Manni

Layers and Telemetry -- What We Can Learn from the Stanford University Breach

DTEX VP of Product Engineering explores why breaches like the Stanford University breach continue to happen.

Read More

April 5, 2021 | Jonathan Daly

Workforce Cyber Intelligence 101: An Overview

Learn about the components of "workforce cyber intelligence" and how it can enable you to empower and protect your employees…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCNS Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

March 24, 2021 | Jay Manni

UEBA Redemption: Identifying Indicators of Intent

Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…

Read More

January 27, 2016 | Dtex Systems

The Most Dangerous Call Center Security Threat: The Why and How of Stopping the Insider Threat

From a security standpoint, call centers are one of the riskiest areas of the enterprise. Like any branch of an…

Read More

October 23, 2015 | Dtex Systems

What Your User Behavior Analytics Initiative is Missing

The value of User Behavior Analytics is without question -- they can give you a whole new insight into user…

Read More

October 8, 2015 | Dtex Systems

The Insider Threat Kill Chain: 5 Steps to Watch Out For

As a company that’s been fighting the insider threat for more than 15 years, we’ve been in the game long…

Read More

August 13, 2015 | Dtex Systems

Oops! The Risk of the Unintentional Insider Threat

When most people think of the insider threat, they think of that picture-perfect stock image of a man in a…

Read More

August 5, 2015 | Dtex Systems

Is $150 Enough to Buy Your Employees?

We were pretty enthralled by last week’s article over at The Register, which covered a survey that claimed that one…

Read More

July 30, 2015 | Dtex Systems

Privileged User Monitoring: A Critical Piece of Insider Threat Prevention

They say that trust is a critical part of any healthy relationship. But when you hear so many tales of…

Read More

July 22, 2015 | Dtex Systems

An Affair They’d Rather Forget: Ashley Madison Victim to Hack

Extramarital affair matchmaking site Ashley Madison was breached yesterday, and the details surrounding the case should make excellent fodder for…

Read More

July 14, 2015 | Dtex Systems

Humans Behaving Badly: Why Insiders Pose the Greatest Security Threat

In today’s increasingly digitized, cloud-based world, insider threat is a REALLY, REALLY big problem.

Read More

July 14, 2015 | Dtex Systems

Retreat to Move Forward: Conquering the Shadow IT Risk

Have you ever wondered what might be hiding in the shadows of your network? Do you really know what your…

Read More

July 14, 2015 | Dtex Systems

The "Simple Solution" to Insider Threat?

Recently, we found ourselves somewhat enthralled by this article from IT World Canada.

Read More