Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More

March 24, 2021 | Jay Manni

UEBA Redemption: Identifying Indicators of Intent

Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…

Read More
Working at home with family

March 16, 2021 | Rajan Koo

Smile, You’re On Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed

The Verkada breach raises concerns about the need for human-centric cyber security intelligence that prioritizes privacy while protecting corporate IP.

Read More

November 3, 2017 | DTEX Systems

Dtex Analyst Files: Catching Phish With User Behavior Intelligence

Though Dtex is not a traditional network firewall or malware solution, our Advanced User Behavior Intelligence Platform is typically working…

Read More