DTEX InTERCEPT for Critical Infrastructure Entities Enhanced. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

April 7, 2021 | Jay Manni

Layers and Telemetry -- What We Can Learn from the Stanford University Breach

DTEX VP of Product Engineering explores why breaches like the Stanford University breach continue to happen.

Read More

April 5, 2021 | Jonathan Daly

Workforce Cyber Intelligence 101: An Overview

Learn about the components of "workforce cyber intelligence" and how it can enable you to empower and protect your employees…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCNS Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More

March 24, 2021 | Jay Manni

UEBA Redemption: Identifying Indicators of Intent

Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…

Read More

September 10, 2015 | Dtex Systems

How to Maintain Security Without Driving Away Millennials

Ah, millennials. The generation everyone loves to hate (seriously, who do they think they are, with their selfies and their…

Read More

August 25, 2015 | Dtex Systems

Your Defense Against the Top 2015 Security Threats: Level Head, Open Eyes

Heading into September, it’s hard not to see certain recurring themes in this year’s data breaches. Over and over again,…

Read More

August 20, 2015 | Dtex Systems

Three M&A Security Threats to Keep on Your Radar

It's official: your company is going through a merger or acquisition. As a security professional, that scares you, and understandably…

Read More

August 13, 2015 | Dtex Systems

Oops! The Risk of the Unintentional Insider Threat

When most people think of the insider threat, they think of that picture-perfect stock image of a man in a…

Read More

August 5, 2015 | Dtex Systems

Is $150 Enough to Buy Your Employees?

We were pretty enthralled by last week’s article over at The Register, which covered a survey that claimed that one…

Read More

July 30, 2015 | Dtex Systems

Privileged User Monitoring: A Critical Piece of Insider Threat Prevention

They say that trust is a critical part of any healthy relationship. But when you hear so many tales of…

Read More

July 22, 2015 | Dtex Systems

An Affair They’d Rather Forget: Ashley Madison Victim to Hack

Extramarital affair matchmaking site Ashley Madison was breached yesterday, and the details surrounding the case should make excellent fodder for…

Read More

July 14, 2015 | Dtex Systems

Humans Behaving Badly: Why Insiders Pose the Greatest Security Threat

In today’s increasingly digitized, cloud-based world, insider threat is a REALLY, REALLY big problem.

Read More

July 14, 2015 | Dtex Systems

Retreat to Move Forward: Conquering the Shadow IT Risk

Have you ever wondered what might be hiding in the shadows of your network? Do you really know what your…

Read More

July 14, 2015 | Dtex Systems

The "Simple Solution" to Insider Threat?

Recently, we found ourselves somewhat enthralled by this article from IT World Canada.

Read More