WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
Countering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreZero Trust Meets Insider Risk Management
What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in…
Read MoreUEBA Redemption (Part 2): Behavioral Enrichment & Predictive Analytics
Learn how Behavioral Enrichment & Predictive Analytics help IT and SecOp pro’s answer questions like Who, What, When, Why, Where…
Read MoreDTEX InTERCEPT Named Gold Winner for Cybersecurity Excellence Awards in Insider Threat Solution Category
DTEX InTERCEPT was named a Gold Winner in the Insider Threat category for the 2021 Cybersecurity Excellence Product/Service Awards.
Read MoreLayers and Telemetry -- What We Can Learn from the Stanford University Breach
DTEX VP of Product Engineering explores why breaches like the Stanford University breach continue to happen.
Read MoreWorkforce Cyber Intelligence 101: An Overview
Learn about the components of "workforce cyber intelligence" and how it can enable you to empower and protect your employees…
Read MoreInsider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities
Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…
Read MoreUEBA Redemption: Identifying Indicators of Intent
Part one of this series on how DTEX addresses the shortcomings of UEBA technology provides a deep dive into the…
Read MoreNew Forrester Research says ‘Motivations & Indicators’ are Key to Mitigating Insider Threats
The latest research from Forrester offers three key take-aways for security pro’s and outlines best practices for designing, implementing and…
Read MoreSmile, You’re On Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed
The Verkada breach raises concerns about the need for human-centric cyber security intelligence that prioritizes privacy while protecting corporate IP.
Read More10 Tips to Strengthen Your Insider Threat Program – Privacy, Policy, Performance [Part 2]
Read this blog post by Lynsey Wolf for 5 more tips on strengthening your Insider Threat Program to prevent data…
Read More10 Tips to Strengthen Your Insider Threat Program – Data, Intent and Context [Part 1]
When building an insider threat program, the same 10 building blocks hold true for everyone. Read this blog post to…
Read MoreDTEX Helps the A3C “Uplift Cyber Security Resilience”
On February 23, 2021 DTEX was excited to join a group of industry experts and distinguished guests in the launch…
Read MoreDLP for the Virtual Enterprise with DTEX InTERCEPT
Legacy Endpoint Data Loss Prevention (DLP) solutions have left organizations with a mountain of challenges and many headaches. With the…
Read More