Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
Layoffs and cybersecurity how to mitigate insider risk

July 19, 2022 | Musa Ishaq

Layoffs & Cyber Security: How to Proactively (and Empathetically) Mitigate Risk

The potential for an economic recession is raising cost-consciousness for organizations globally. It’s also changing how businesses should be thinking…

Read More
cost of ownership right tool for IRM blog post

July 13, 2022 | DTEX Systems

The Cost of Ownership Demands Attention: Choosing the Right Tool for IRM

We have talked a lot about the differences between Insider Risk Management and Insider Threat Surveillance solutions for defending…

Read More
Insider Risk Management cyber ecosystem

July 8, 2022 | DTEX Systems

Insider Risk Intelligence—A Value Multiplier for the Cyber Ecosystem

We all know there is no “silver bullet” to solve address all security threats. Enterprise security professionals use a variety…

Read More
Demand for workforce cyber intelligence and security partner program DTEX

July 6, 2022 | DTEX Systems

Why I Joined DTEX: Meeting the Demand for Workforce Cyber Intelligence & Security Solutions

The news is officially out: I am thrilled to join DTEX as its new Vice President of Worldwide Channel…

Read More
Globe News

July 6, 2022 | DTEX Systems

Workforce Cyber Intelligence and Security News Digest—June 2022

We’re back again with another monthly Workforce Cyber Intelligence & Security News Digest, as the month of June has quickly…

Read More
Time to value for Insider Risk Management blog post

June 28, 2022 | DTEX Systems

Time to Value for Insider Risk Management is Key to Adoption & Success

In previous posts we have covered several critical factors for organizations to consider when comparing insider risk management and…

Read More
Two young businesswomen shaking hands in a modern office discussing insider risk management

June 23, 2022 | DTEX Systems

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 2)

A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…

Read More
Gartner Insider Risk Management Market Guide woman holding tablet

June 21, 2022 | DTEX Systems

Gartner Insider Risk Management Market Guide: 4 Things You Need to Know

By numerous measures, the insider risk management market has exploded in prominence and importance over the past three years. From…

Read More
Globe News

May 31, 2022 | DTEX Systems

Workforce Cyber Intelligence & Security News Digest – May 2022

We are gearing up to start travel and in-person conferences again and are excited to see many of our customers…

Read More
Behavioral intent not invasive surveillance insider risk management

May 24, 2022 | DTEX Systems

Understanding Behavioral Intent Doesn't Equal Invasive Surveillance

One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…

Read More
Insider Risk Management 7 steps to zero trust

May 20, 2022 | DTEX Systems

Insider Risk Management—A 7 Step Approach to Zero Trust (Part 1)

Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While…

Read More
Scalability is critical for insider risk management blog post

May 17, 2022 | DTEX Systems

Why Scalability is a Must Have for Insider Risk Management

This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…

Read More