WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreLayoffs & Cyber Security: How to Proactively (and Empathetically) Mitigate Risk
The potential for an economic recession is raising cost-consciousness for organizations globally. It’s also changing how businesses should be thinking…
Read MoreThe Cost of Ownership Demands Attention: Choosing the Right Tool for IRM
We have talked a lot about the differences between Insider Risk Management and Insider Threat Surveillance solutions for defending…
Read MoreInsider Risk Intelligence—A Value Multiplier for the Cyber Ecosystem
We all know there is no “silver bullet” to solve address all security threats. Enterprise security professionals use a variety…
Read MoreWhy I Joined DTEX: Meeting the Demand for Workforce Cyber Intelligence & Security Solutions
The news is officially out: I am thrilled to join DTEX as its new Vice President of Worldwide Channel…
Read MoreWorkforce Cyber Intelligence and Security News Digest—June 2022
We’re back again with another monthly Workforce Cyber Intelligence & Security News Digest, as the month of June has quickly…
Read MoreTime to Value for Insider Risk Management is Key to Adoption & Success
In previous posts we have covered several critical factors for organizations to consider when comparing insider risk management and…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 2)
A few weeks ago we shared with you the first part of our two-part blog series summarizing the key…
Read MoreGartner Insider Risk Management Market Guide: 4 Things You Need to Know
By numerous measures, the insider risk management market has exploded in prominence and importance over the past three years. From…
Read MoreWorkforce Cyber Intelligence & Security News Digest – May 2022
We are gearing up to start travel and in-person conferences again and are excited to see many of our customers…
Read MoreUnderstanding Behavioral Intent Doesn't Equal Invasive Surveillance
One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 1)
Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While…
Read MoreWhy Scalability is a Must Have for Insider Risk Management
This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…
Read More