DTEX InTERCEPT for Critical Infrastructure Entities Enhanced. READ THE NEWS HERE.



A Human-centric Approach to Operational Awareness and Risk Management.


April 7, 2021 | Jay Manni

Layers and Telemetry -- What We Can Learn from the Stanford University Breach

DTEX VP of Product Engineering explores why breaches like the Stanford University breach continue to happen.

Read More

April 5, 2021 | Jonathan Daly

Workforce Cyber Intelligence 101: An Overview

Learn about the components of "workforce cyber intelligence" and how it can enable you to empower and protect your employees…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCNS Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

March 24, 2021 | Jay Manni

UEBA Redemption: Identifying Indicators of Intent

Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…

Read More

October 6, 2020 | Rajan Koo

2020 Insider Threat Report - Hide & Seek

As noted earlier, the DTEX 2020 Insider Threat Behavior Report surveyed hundreds of customers and Global 5000 organizations to learn…

Read More

September 30, 2020 | Rajan Koo

2020 Threat Report: Remote and @Risk - Trusted Insider or Malicious Threat

The Covid-19 pandemic and the rapid, forced adoption of a remote workforce has changed how organizations do business. It has…

Read More

September 23, 2020 | Rajan Koo

The Insider Threat Kill Chain - Reconnaissance

It is increasingly difficult to defend against attacks. This has led security teams to acknowledge the inevitability of a successful…

Read More

September 16, 2020 | Rajan Koo

What is the Insider Threat Kill Chain

The “Kill Chain” is a warfare term for the process of targeting and destroying enemy forces in such a way…

Read More

July 22, 2020 | Jonathan Daly

New Dtex Intercept 6.0 Puts Human Element at the center of Next-Gen Insider Threat Management

Investments in point solutions and reliance on modules from SIEM and EPP platforms are falling short as evidenced by the…

Read More

March 27, 2020 | Jonathan Daly

Top 3 Security Holes to Address for Companies with WFH Employees

The widespread decision corporations have made to allow employees to WFH is a great thing – both for business and…

Read More

December 19, 2019 | Jonathan Daly

Analyst Breach Insights, Week of December 19: Looking Back on 2019 and Forward to 2020 and Beyond

At long last, the end of a year -- and a decade! -- looms, and a new one is practically…

Read More

November 26, 2019 | Jonathan Daly

Analyst Breach Insights Week of November 26: Macy’s Breach(es), the Definition of Insanity, and Breaking the Cycle

In this week’s Analyst Breach Insights, we’re discussing Macy’s recent data breach, as well as the broader question: why is…

Read More

November 14, 2019 | Jonathan Daly

Analyst Breach Insights Week of November 14: Dissecting the Trend Micro Insider Breach

In this week’s analyst breach report, we’re taking a look at on one particularly interesting breach that happened last week…

Read More

October 17, 2019 | Jonathan Daly

Federal Organizations, Insider Threats, and the Pressing Need for Modern UAM

Last week saw yet another reminder of why it is so important to have a comprehensive insider threat strategy in…

Read More

September 23, 2019 | Jonathan Daly

Insider Threat Awareness Month: Information vs. Intelligence

September is Insider Threat Awareness Month, and in recognition, we’re running new articles that shed light on a different commonly-misunderstood…

Read More

September 13, 2019 | Jonathan Daly

Decoding Context: Introducing the Insider Threat Kill Chain Video Course

We are extremely excited to announce that we have officially kicked off our first ever multi-part video course, “The Key…

Read More