WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreEmployees’ Side Hustles: The Hidden Threat to Your Organization’s Cybersecurity
Do your employees have a side gig they’re passionate about? They may be unintentionally putting your security at risk. Here’s…
Read MoreWhat to Consider in your Multinational IRM program
In a previous post we discussed why companies need a multi-national strategy when building their Insider Risk Management (IRM)…
Read MoreTime to Value for Insider Risk Management is Key to Adoption & Success
In previous posts we have covered several critical factors for organizations to consider when comparing insider risk management and…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 2)
A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…
Read MoreUnderstanding Behavioral Intent Doesn't Equal Invasive Surveillance
One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 1)
Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While…
Read MoreDTEX i3 Team Q&A: The Super Malicious Insider
Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…
Read MoreHow to Protect Your Work-From-Home Workforce—Examining Forrester Research’s Take
Not too long ago Heidi Shey of Forrester Research released her thoughts on how enterprises can best protect the…
Read MoreCompliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring
Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…
Read MoreUnderstanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors
Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…
Read MoreNew Year, New Security Risks: Why 2022 Will be The Year of Data Introduction
Cybersecurity threats continued to advance in 2021, as the ongoing Covid-19 pandemic accelerated digital transformation for enterprises around the world.
Read More2021 Remote Workforce Security Report: Organizations Still Lack Confidence in Security Practices
Even with news of successful vaccines in production, most of us know that Covid-19, and the challenges brought along with…
Read More