Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
striking balance insider risk and privacy blog post

April 20, 2022 | DTEX Systems

Why Striking the Balance Between Insider Risk and Privacy is More Important Than Ever

The last three years have changed the workplace more than any other period in history. We’re now in a new…

Read More
cybersecurity career tips 2022

April 12, 2022 | Mohan Koo

3 Ways to Take Control of Your Cyber Security Career in 2022

As the cyber security landscape continues to transform before our eyes, it’s becoming increasingly evident that we can no longer…

Read More
Super Malicious Insider Q&A image

April 7, 2022 | Armaan Mahbod

DTEX i3 Team Q&A: The Super Malicious Insider

Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…

Read More
Globe News

April 5, 2022 | DTEX Systems

Workforce Cyber Intelligence & Security News Digest—March 2022

It’s crazy to believe it’s already been a month since we shared our last Workforce Cyber Intelligence & Security…

Read More
world backup day best practices for insider risk management

March 31, 2022 | DTEX Systems

World Backup Day: How Insider Threats Intersect with Data Backup and Best Practices for Insider Risk Management

World Backup Day is a great time to review the basics of backing up data, and looking ahead to…

Read More
DTEX and Netskope

March 29, 2022 | DTEX Systems

The Great Data Infiltration of 2022—The Data You Don’t Want & Why

Sensitive Data and Infiltration Risk The Great Resignation picked up steam in 2021. According to the U.S. Bureau of…

Read More
System Security Specialist Working at System Control Center. Room is Full of Screens Displaying Various Information.

March 23, 2022 | Rajan Koo

Utilizing DTEX InTERCEPT to Maximize Investment in Microsoft 365 E5

Change. It’s the one constant we can all count on. And in the last few years we’ve seen more than…

Read More
pseudonymization dtex protect employee privacy insider risk management

March 22, 2022 | DTEX Systems

How DTEX’s Data Pseudonymization Techniques Protect Employee Privacy

Making an effort to balance privacy and security is vital for organizations who want to thrive in the new normal.

Read More
Protecting Work from Home Workforce Forrester

March 17, 2022 | DTEX Systems

How to Protect Your Work-From-Home Workforce—Examining Forrester Research’s Take

Not too long ago Heidi Shey of Forrester Research released her thoughts on how enterprises can best protect the…

Read More

March 15, 2022 | Bahman Mahbod

Product Innovation & Ecosystem Extension Drive Triple-Digit Growth & Global Expansion

Today is one of those days we all cherish as leaders and technologists, a day when we can thank our…

Read More
business meeting video conference

March 10, 2022 | DTEX Systems

How Work-from-Anywhere Affects Employee Behavior

For the past two years most of the people reading this blog have worked from home. While we have all…

Read More

March 8, 2022 | Lynsey Wolf

When the Hackers are Insiders—the Super Malicious Threat

When organizations think of insider threats, the focus is often on disgruntled or malicious employees or partners misusing data. This…

Read More