WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreWhy Striking the Balance Between Insider Risk and Privacy is More Important Than Ever
The last three years have changed the workplace more than any other period in history. We’re now in a new…
Read More3 Ways to Take Control of Your Cyber Security Career in 2022
As the cyber security landscape continues to transform before our eyes, it’s becoming increasingly evident that we can no longer…
Read MoreDTEX i3 Team Q&A: The Super Malicious Insider
Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…
Read MoreWorkforce Cyber Intelligence & Security News Digest—March 2022
It’s crazy to believe it’s already been a month since we shared our last Workforce Cyber Intelligence & Security…
Read MoreWorld Backup Day: How Insider Threats Intersect with Data Backup and Best Practices for Insider Risk Management
World Backup Day is a great time to review the basics of backing up data, and looking ahead to…
Read MoreThe Great Data Infiltration of 2022—The Data You Don’t Want & Why
Sensitive Data and Infiltration Risk The Great Resignation picked up steam in 2021. According to the U.S. Bureau of…
Read MoreUtilizing DTEX InTERCEPT to Maximize Investment in Microsoft 365 E5
Change. It’s the one constant we can all count on. And in the last few years we’ve seen more than…
Read MoreHow DTEX’s Data Pseudonymization Techniques Protect Employee Privacy
Making an effort to balance privacy and security is vital for organizations who want to thrive in the new normal.
Read MoreHow to Protect Your Work-From-Home Workforce—Examining Forrester Research’s Take
Not too long ago Heidi Shey of Forrester Research released her thoughts on how enterprises can best protect the…
Read MoreProduct Innovation & Ecosystem Extension Drive Triple-Digit Growth & Global Expansion
Today is one of those days we all cherish as leaders and technologists, a day when we can thank our…
Read MoreHow Work-from-Anywhere Affects Employee Behavior
For the past two years most of the people reading this blog have worked from home. While we have all…
Read MoreWhen the Hackers are Insiders—the Super Malicious Threat
When organizations think of insider threats, the focus is often on disgruntled or malicious employees or partners misusing data. This…
Read More