WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

When it Comes to Insider Risk, the Difference is Human
We have a saying here at DTEX: the difference is human. We know that enterprise security is only achievable when…
Read More
Crawl, Walk, Run: How to Kickstart your Insider Risk Program
Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing…
Read More
Case Study: DTEX InTERCEPT Helps Multinational Retailer Gain Visibility into Risk in Retail Stores
As insider risks and threats become more prevalent with the rise of e-commerce and hybrid work, cybersecurity tools are…
Read More
Say it Ain’t So Mom! Back to School Shopping & Retail Cybersecurity
Yep, it’s the time of year every kid loves, but hates more…Time to start back to school shopping. Major transformations…
Read More
What to Consider in your Multinational IRM program
In a previous post we discussed why companies need a multi-national strategy when building their Insider Risk Management (IRM)…
Read More
Privacy Makes all the Difference: Insider Risk Management and Insider Threat Surveillance
As insider risks, whether born from negligence, external intimidation, or true malicious internal threats, grow, organizations need to take steps…
Read More
Why Striking the Balance Between Insider Risk and Privacy is More Important Than Ever
The last three years have changed the workplace more than any other period in history. We’re now in a new…
Read More
CISA Insider Threat Self-Assessment Tool Hits the 'Metadata' Point
In late October the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National Security…
Read More
The Grinch of the Enterprise: Attackers That Take Advantage of Risky Employee Behaviors
With the holiday season upon us, it’s truly an incredible time of year. Folks are planning holiday get-togethers, searching for…
Read More
Stories from the Field - Kaseya REvil Ransomware Attacks
Welcome back to our Stories from the Field series, where we share info on how our Insider Threat analysts work…
Read More
Analyst Breach Insights Week of November 26: Macy’s Breach(es), the Definition of Insanity, and Breaking the Cycle
In this week’s Analyst Breach Insights, we’re discussing Macy’s recent data breach, as well as the broader question: why is…
Read More
Catching Complex Threats: The Rise of Credential Stuffing
The number of attack vectors and exploitation methods that organizations must address grows exponentially everyday. One such vector that has…
Read More
5 Reasons Why Elf on the Shelf is Santa's Endpoint Visibility
I'm about to ask you a question that might derail your entire day: Did you move your Elf on the…
Read More