WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreDecoding Context: Introducing the Insider Threat Kill Chain Video Course
We are extremely excited to announce that we have officially kicked off our first ever multi-part video course, “The Key…
Read MoreInsider Threat Awareness Month: An Opportunity for Education and a Sign of Shifting Tides
Last week, the National Counterintelligence and Security Center – a component of the Office of Director of National Intelligence --…
Read MoreDecoding the Evolution of Insider Threats: The ESG Insider Threat Program Realities Report
Over the years, we have conducted hundreds of insider threat assessments and have investigated too many insider incidents to count.
Read MoreDeveloping a Modern Path Forward for Insider Threat Detection in Federal Organizations
Today, we were very pleased to announce that Dtex has officially received a US Department of Defense Authority to Operate.
Read MoreFaceApp Stirs Up Privacy Concerns; Emergency Meeting Called in Wake of Desjardins Data Breach
In the news last week: FaceApp raises privacy and security concerns, and an emergency summer meeting is called following the…
Read MoreInsider Threat Challenges, Lessons Learned and Opportunities
News headlines this week focus on challenges, opportunities and lessons learned as organizations grapple with insider threats.
Read MoreCanadian Financial Institution Victim of Insider Threat; Data Leakage Ranks as Top Cloud Security Concern
Security-related news last week detailed how a Canadian financial institution fell victim to an insider threat and highlighted two recent…
Read MoreComplex Threats like Credential Stuffing on the Rise; Incident Response is Weak Link in Mitigating Cyber Risk
As businesses work hard to close security gaps, this week's news headlines highlight the challenges of defending against complex threats…
Read MoreCatching Complex Threats: The Rise of Credential Stuffing
The number of attack vectors and exploitation methods that organizations must address grows exponentially everyday. One such vector that has…
Read MorePoor Cloud Security Practices Put Data at Risk; A Detailed Look at How Hackers Target Employees
Security news coverage from the past week underscores how poor cloud security practices are putting organizations - and their sensitive…
Read MoreNew Industry Research Underscores Dangers Associated with Employee Errors, Misused or Abused Privileged Access
A slew of industry reports published over the last week highlight the security risks associated with employee errors and poor…
Read MoreSnapchat Report Highlights Insider Threats as Top Challenge for Privacy; Employee Mistakes Named Top Data Security Threat in Hong Kong and Taiwan
News headlines this week reveal employee data abuse at Snapchat, highlighting the insider threat as a top challenge for data…
Read More