WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Insider Risk Management or Insider Threat Surveillance?
The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…
Read More
2022 Insider Risk Report ~ The Rise of the Super Malicious Insider
Earlier today we published our 2022 Insider Risk Report, our fifth consecutive since 2017. The purpose of our reports…
Read More
Compliance with NITTF, CNSSD 504 Using Workforce Cyber Security vs. User Activity Monitoring
Insider threats have long been recognized as a problem by the Federal Government. The National Insider Threat Task…
Read More
Stories from the Field: How DTEX i3 Identified Personal Criminal Activity on a Corporate Device
When sports started being televised 50+ years ago, it brought a new level of visibility to teams and games. You…
Read More
Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors
Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of…
Read More
DTEX Named Best-in-Class UEBA Solution in 2021 GigaOm Radar Report
Happy New Year! It certainly is for us here at DTEX. A few days before Christmas, on December 21st,…
Read More
CISA Insider Threat Self-Assessment Tool Hits the 'Metadata' Point
In late October the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National Security…
Read More
Top Challenges to Managing Insider Threats
In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to…
Read More
What Is User & Entity Behavior Analytics (UEBA)?
Learn what is User & Entity Behavior Analytics (UEBA) alongside the differences between outdated Indicators of Compromise vs. modern Indicators…
Read More
UEBA Redemption (Part 2): Behavioral Enrichment & Predictive Analytics
Learn how Behavioral Enrichment & Predictive Analytics help IT and SecOp pro’s answer questions like Who, What, When, Why, Where…
Read More
UEBA Redemption: Identifying Indicators of Intent
Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…
Read More
Smile, You’re On Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed
The Verkada breach raises concerns about the need for human-centric cyber security intelligence that prioritizes privacy while protecting corporate IP.
Read More
Dtex Analyst Files: Catching Phish With User Behavior Intelligence
Though Dtex is not a traditional network firewall or malware solution, our Advanced User Behavior Intelligence Platform is typically working…
Read More