WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreAustralian Government IT Worker Runs Illegal Cryptomining Operation at Work; Cloud Migration Brings Increased Insider Threat Risk
Headlines from the past week focus on an Australian government IT contractor arrested on suspicion of running an illegal cryptocurrency…
Read MoreSamsung hit with data spill, exposed credentials; Former worker intentionally damages Oregon Medicaid System
Last week's news headlines reveal sensitive source code, credentials, and data were leaked at a Samsung development lab and a…
Read MoreHelping Law & Finance Firms Proactively Manage Insider Threats; April Security Research Roundup
Industry coverage focuses on how legal and finance organizations can proactively manage insider threats, as well as recent security research.
Read MoreCasual Employee Attitudes Equal Security Risks; Healthcare Joins Manufacturing as Industry Plagued by Insider Threats
Industry reports highlight the plethora of challenges organizations are facing - across industries - when it comes to managing insider…
Read MoreFull Visibility and the Insider Threat Kill Chain: Why it is Critical to See Every Stage
The risks associated with those inside of the organization are widely acknowledged, well-documented, and increasingly prioritized. Yet, a formidable challenge…
Read MoreMicrosoft Hack an Example of Insider Threat? Yes. TransUnion Gets Serious About Insider Threat
Insider threat or not? That seems to be the questions surrounding a recent breach that struck Microsoft between January and…
Read MoreNews Reveals Critical Role Evidence Gathering Plays in Insider Threat Defense; Fifth Annual Insider Threat Summit this Week
There have been several interesting events that have taken place in the insider threat space over the past week that…
Read MoreNegligent Insider Threats Dominate, Malicious Still Need Attention; Dtex to Present at Insider Threat Summit
Dtex Systems VP of federal David Wilcox will be presenting at the Insider Threat Summit. Attendees will have an opportunity…
Read MoreHeadlines Show How Endpoint Detection, Forensics Stop and Convict Insider Threats
Over the past several weeks, we’ve seen several examples of how insider threats have been detected, arrested and successfully prosecuted.
Read MoreThis Week's Insider Threat News Trends: How to Scale Detection, Negligent Exposures, Malicious Intent
There is no shortage of cybersecurity offerings that can detect, prevent and mitigate problems. One of the challenges organizations face…
Read MoreMedia Attention Stays Focused on Insider Threat, Byline by Dtex Insider Threat Specialist Katie Burnell Explains What It All Means
The cybersecurity news media’s attention remains focused on the insider threat, especially on the data breaches, leaks and exposures caused…
Read MoreIntroducing the 2019 Insider Threat Intelligence Report
We recently hit an exciting milestone here at Dtex: the release of our 2019 Insider Threat Intelligence Report. Published annually,…
Read More