Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
Two young businesswomen shaking hands in a modern office discussing insider risk management

June 23, 2022 | DTEX Systems

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 2)

A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…

Read More
Behavioral intent not invasive surveillance insider risk management

May 24, 2022 | DTEX Systems

Understanding Behavioral Intent Doesn't Equal Invasive Surveillance

One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…

Read More
Scalability is critical for insider risk management blog post

May 17, 2022 | DTEX Systems

Why Scalability is a Must Have for Insider Risk Management

This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…

Read More
insider threats in healthcare HHS

April 28, 2022 | DTEX Systems

A New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare

Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…

Read More
compliance with check mark and other regulations insider risk management blog post

February 3, 2022 | DTEX Systems

Compliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring

Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…

Read More
fingers typing on computer criminal activity on corporate device insider risk management

January 20, 2022 | Armaan Mahbod

Stories from the Field: How DTEX i3 Identified Personal Criminal Activity on a Corporate Device

When sports started being televised 50+ years ago, it brought a new level of visibility to teams and games. You…

Read More
two people looking at computer insider risk solution landscape blog post

January 18, 2022 | DTEX Systems

Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors

Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…

Read More
man on computer insider risk management

January 4, 2022 | DTEX Systems

DTEX Named Best-in-Class UEBA Solution in 2021 GigaOm Radar Report

Happy New Year! It certainly is for us here at DTEX. A few days before Christmas, on December 21st,…

Read More
CISA insider threat self-assessment image blog post

December 16, 2021 | Armaan Mahbod

CISA Insider Threat Self-Assessment Tool Hits the 'Metadata' Point

In late October the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National Security…

Read More

November 16, 2021 | DTEX Systems

Top Challenges to Managing Insider Threats

In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…

Read More

June 9, 2021 | Jay Manni

What Is User & Entity Behavior Analytics (UEBA)?

Learn what is User & Entity Behavior Analytics (UEBA) alongside the differences between outdated Indicators of Compromise vs. modern Indicators…

Read More

April 12, 2021 | Jay Manni

UEBA Redemption (Part 2): Behavioral Enrichment & Predictive Analytics

Learn how Behavioral Enrichment & Predictive Analytics help IT and SecOp pro’s answer questions like Who, What, When, Why, Where…

Read More