WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreThe Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches
In a year full of company milestones, it’s not surprising that we have more great news to share. We were…
Read MoreAn Unexpected Cost-Saving Tool for Software Contract Negotiation Management
One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they…
Read MoreCombating Shadow IT: A Customer Uses DTEX for Cybersecurity & More
“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user…
Read MoreVicTrack & DTEX: Security Product for Business Continuity Planning?
Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits…
Read MoreWhat Is a Next-Gen Insider Threat Solution?
Historically, insider threat management took the form of “point solutions" for specific issues. Today, a next-gen product must address genuine…
Read MoreWhat Is User & Entity Behavior Analytics (UEBA)?
Learn what is User & Entity Behavior Analytics (UEBA) alongside the differences between outdated Indicators of Compromise vs. modern Indicators…
Read MoreDTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices
While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…
Read MoreWorkforce Cyber Intelligence 106: Nine Workforce Cyber Intelligence Use Cases
Explore how Workforce Cyber Intelligence, a novel approach to learning from employees that enables informed business decisions, through nine use…
Read MoreWorkforce Cyber Intelligence 105: Improving Operational Efficiency with Workforce Visibility
We previously explored protection that Workforce Cyber Intelligence provides employers & employees. Now, learn how Workforce Visibility improves Operational Efficiency.
Read MoreWorkforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats
Behavior analysis and workforce monitoring can coexist and even flourish alongside privacy and security to detect malicious insiders. This blog…
Read MoreWilliams Racing Protects Culture & Data with Privacy-first Approach to Insider Threat Mitigation
Insider Threat protection is a top concern for IP-rich organizations like Williams Racing. Learn how they use DTEX to mitigate…
Read MoreWorkforce Cyber Intelligence 103: The Importance of User Privacy & Trust
Dive deeper into one of the key pillars of Workforce Cyber Intelligence: privacy.
Read More