WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

May 5, 2022 | Jonathan Daly

Insider Risk Management or Insider Threat Surveillance?

The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…

Read More

February 8, 2022 | Rajan Koo

2022 Insider Risk Report ~ The Rise of the Super Malicious Insider

Earlier today we published our 2022 Insider Risk Report, our fifth consecutive since 2017. The purpose of our reports…

Read More

June 23, 2022 | Jonathan Daly

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 2)

A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…

Read More

May 24, 2022 | Jonathan Daly

Understanding Behavioral Intent Doesn't Equal Invasive Surveillance

One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…

Read More

May 17, 2022 | Jonathan Daly

Why Scalability is a Must Have for Insider Risk Management

This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…

Read More

April 28, 2022 | Jonathan Daly

A New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare

Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…

Read More

February 3, 2022 | Jonathan Daly

Compliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring

Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…

Read More

January 25, 2022 | Jonathan Daly

DTEX Winter Virtual Briefing Series Presents Insider Risk Trends and Solutions

As cybersecurity trends develop for 2022, there continues to be a myriad of topics to focus on and things…

Read More

January 20, 2022 | Armaan Mahbod

Stories from the Field: How DTEX i3 Identified Personal Criminal Activity on a Corporate Device

When sports started being televised 50+ years ago, it brought a new level of visibility to teams and games. You…

Read More

January 18, 2022 | Jonathan Daly

Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors

Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…

Read More

January 4, 2022 | Jonathan Daly

DTEX Named Best-in-Class UEBA Solution in 2021 GigaOm Radar Report

Happy New Year! It certainly is for us here at DTEX. A few days before Christmas, on December 21st,…

Read More

December 16, 2021 | Armaan Mahbod

CISA Insider Threat Self-Assessment Tool Hits the 'Metadata' Point

In late October the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National Security…

Read More

November 16, 2021 | Jonathan Daly

Top Challenges to Managing Insider Threats

In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…

Read More

June 9, 2021 | Jay Manni

What Is User & Entity Behavior Analytics (UEBA)?

Learn what is User & Entity Behavior Analytics (UEBA) alongside the differences between outdated Indicators of Compromise vs. modern Indicators…

Read More