WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreHow to Determine What Data to Protect and Who to Protect It From
We had the opportunity to moderate an incredibly interesting panel discussion at the SANS Institute Forum back in September,…
Read MoremacOS Monterey Demonstrates Apple’s Commitment to User Privacy & Enterprise Workforce Security
On October 25, 2021 Apple released macOS Monterey, the 18th and current major release of macOS, Apple’s desktop operating…
Read MoreWorkforce Cyber Intelligence & Security News Digest - October 2021
Cybersecurity Awareness Month in the Rearview, but Security Always Top-of-Mind This week marks the end of Cybersecurity Awareness Month.
Read MoreNo One Wins Alone – DTEX I3 Responds to Growing Need for Insider Risk Services
On Wednesday, October 27th my colleagues and I here at DTEX Systems did a thing…we answered the market’s ‘bat signal’…
Read MoreWhat is Zero Trust? Three Things to Keep in Mind as Your Organization Works Towards Developing This Mindset
The term ‘Zero Trust’ has been a popular concept in cybersecurity for some time, but the transition to remote and…
Read MoreCISA Warns of Water, Wastewater Infrastructure Security Threats on Heels of Insider Threat Self-Assessment Tool Release
On Thursday, October 14th the Cybersecurity and Infrastructure Security Agency (CISA), along with the Environmental Protection Agency (EPA), the National…
Read MoreThe Seven Ways Equinix is Supercharging NGAV with DTEX InTERCEPT
Next-Gen Antivirus (NGAV) technology has greatly improved many organizations’ abilities to detect, identify, and stop malware from infecting their…
Read MoreThe Facebook Whistleblower and the Insider Threat Kill Chain
The reverberations from Facebook whistleblower Frances Haugen’s campaign will be felt for months to come. While the focus needs to…
Read MoreStories from the Field - Kaseya REvil Ransomware Attacks
Welcome back to our Stories from the Field series, where we share info on how our Insider Threat analysts work…
Read MoreDTEX Systems Named User Behavior Analytics Platform of the Year in the 2021 Cyber Security Breakthrough Awards
DTEX Systems Named User Behavior Analytics Platform of the Year in the 2021 CyberSecurity Breakthrough Awards…
Read MoreSplunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise
The decentralization of the modern enterprise — and the digital empowerment of the insider — have since expanded the attack…
Read MoreStories from the Field – Unusual Insider Activity: Not Always Malicious
Working with DTEX customers is incredibly rewarding – I’ve helped security teams identify and thwart numerous malicious insiders and prevent…
Read More