WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreAnalyst Breach Insights Week of November 26: Macy’s Breach(es), the Definition of Insanity, and Breaking the Cycle
In this week’s Analyst Breach Insights, we’re discussing Macy’s recent data breach, as well as the broader question: why is…
Read MoreCatching Complex Threats: The Rise of Credential Stuffing
The number of attack vectors and exploitation methods that organizations must address grows exponentially everyday. One such vector that has…
Read More5 Reasons Why Elf on the Shelf is Santa's Endpoint Visibility
I'm about to ask you a question that might derail your entire day: Did you move your Elf on the…
Read More