WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreInsider Risk Management & Actionable Reporting ~ No Video Required
In our previous IRM vs. Insider Threat Surveillance blog post we discussed the importance of behavioral analytics as an…
Read MoreWorkforce Cyber Intelligence & Security News Digest – May 2022
We are gearing up to start travel and in-person conferences again and are excited to see many of our customers…
Read MoreUnderstanding Behavioral Intent Doesn't Equal Invasive Surveillance
One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration),…
Read MoreInsider Risk Management—A 7 Step Approach to Zero Trust (Part 1)
Zero Trust security has arrived in full force, and that’s a very good thing for every cyber security practitioner. While…
Read MoreWhy Scalability is a Must Have for Insider Risk Management
This is the third post in our blog series discussing Insider Threat Surveillance vs. Insider Risk Management tools. Read…
Read MoreWhy You Need a Multi-national IRM Program
Insider Risk or Threat Management (IRM) programs are quickly becoming a must-have for global organizations and enterprises. The risk…
Read MorePrivacy Makes all the Difference: Insider Risk Management and Insider Threat Surveillance
As insider risks, whether born from negligence, external intimidation, or true malicious internal threats, grow, organizations need to take steps…
Read MoreProtect Your Data: Cyber Security Tips for Online Shopping This Mother’s Day
In this blog, we frequently focus on how organizations can protect against malicious insider threats. However, we haven’t forgotten about…
Read MoreInsider Risk Management or Insider Threat Surveillance?
The risk from malicious insiders has long been top-of-mind among security professionals. More recently it has grabbed the attention of…
Read MoreWorkforce Cyber Intelligence & Security News Digest – April 2022
Insider threats continue to be a major area of concern for cyber security professionals across the world—and for good reason!…
Read MoreA New Day, A New Warning: HHS Issues Guidance to HPH Sector About Insider Threats in Healthcare
Earlier this month the Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) issued a report…
Read MoreEmployee Stress & Insider Threats: How to Mitigate Risk from a Security & HR Standpoint
April is Stress Awareness Month. It’s been recognized as such since 1992, but given the events of the past…
Read More