WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreUEBA Redemption: Identifying Indicators of Intent
Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…
Read MoreSmile, You’re On Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed
The Verkada breach raises concerns about the need for human-centric cyber security intelligence that prioritizes privacy while protecting corporate IP.
Read MoreDtex Analyst Files: Catching Phish With User Behavior Intelligence
Though Dtex is not a traditional network firewall or malware solution, our Advanced User Behavior Intelligence Platform is typically working…
Read More