WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

$16.2M: The High Cost of Insider "Risks"
Last week DTEX released the 2023 Cost of Insider Risks Global Report, independently conducted by Ponemon Institute. The…
Read More
Pentagon Compromise | The Most Effective Insider Threat Sensors Are People
DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…
Read More
GigaOm Recognizes DTEX as the Only Outperforming Leader in 2022 Data Loss Prevention Radar Report
There is nothing more gratifying in a crowded market filled with good technology, built by smart people, than to be…
Read More
The Privacy Patent that Makes Workforce Cyber Intelligence Possible
Building an engaged workforce in a work-from-anywhere environment is important to business success. As noted in other posts, an…
Read More
Case Study: DTEX InTERCEPT Helps Multinational Retailer Gain Visibility into Risk in Retail Stores
As insider risks and threats become more prevalent with the rise of e-commerce and hybrid work, cybersecurity tools are…
Read More
Say it Ain’t So Mom! Back to School Shopping & Retail Cybersecurity
Yep, it’s the time of year every kid loves, but hates more…Time to start back to school shopping. Major transformations…
Read More
What to Consider in your Multinational IRM program
In a previous post we discussed why companies need a multi-national strategy when building their Insider Risk Management (IRM)…
Read More
Privacy Makes all the Difference: Insider Risk Management and Insider Threat Surveillance
As insider risks, whether born from negligence, external intimidation, or true malicious internal threats, grow, organizations need to take steps…
Read More
Why Striking the Balance Between Insider Risk and Privacy is More Important Than Ever
The last three years have changed the workplace more than any other period in history. We’re now in a new…
Read More
CISA Insider Threat Self-Assessment Tool Hits the 'Metadata' Point
In late October the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National Security…
Read More
The Grinch of the Enterprise: Attackers That Take Advantage of Risky Employee Behaviors
With the holiday season upon us, it’s truly an incredible time of year. Folks are planning holiday get-togethers, searching for…
Read More
Stories from the Field - Kaseya REvil Ransomware Attacks
Welcome back to our Stories from the Field series, where we share info on how our Insider Threat analysts work…
Read MoreAnalyst Breach Insights Week of November 26: Macy’s Breach(es), the Definition of Insanity, and Breaking the Cycle
In this week’s Analyst Breach Insights, we’re discussing Macy’s recent data breach, as well as the broader question: why is…
Read MoreCatching Complex Threats: The Rise of Credential Stuffing
The number of attack vectors and exploitation methods that organizations must address grows exponentially everyday. One such vector that has…
Read More