WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 2)
A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…
Read MoreUnderstanding Behavioral Intent Doesn't Equal Invasive Surveillance
One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…
Read MoreWhy Scalability is a Must Have for Insider Risk Management
This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…
Read MoreA New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare
Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…
Read MoreCompliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring
Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…
Read MoreStories from the Field: How DTEX i3 Identified Personal Criminal Activity on a Corporate Device
When sports started being televised 50+ years ago, it brought a new level of visibility to teams and games. You…
Read MoreUnderstanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors
Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…
Read MoreDTEX Named Best-in-Class UEBA Solution in 2021 GigaOm Radar Report
Happy New Year! It certainly is for us here at DTEX. A few days before Christmas, on December 21st,…
Read MoreCISA Insider Threat Self-Assessment Tool Hits the 'Metadata' Point
In late October the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National Security…
Read MoreTop Challenges to Managing Insider Threats
In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…
Read MoreWhat Is User & Entity Behavior Analytics (UEBA)?
Learn what is User & Entity Behavior Analytics (UEBA) alongside the differences between outdated Indicators of Compromise vs. modern Indicators…
Read MoreUEBA Redemption (Part 2): Behavioral Enrichment & Predictive Analytics
Learn how Behavioral Enrichment & Predictive Analytics help IT and SecOp pro’s answer questions like Who, What, When, Why, Where…
Read More