Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

April 23, 2024 | Kellie Roessler

DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More

October 8, 2015 | DTEX Systems

The Insider Threat Kill Chain: 5 Steps to Watch Out For

As a company that's been fighting the insider threat for more than 15 years, we've been in the game long…

Read More

September 10, 2015 | DTEX Systems

How to Maintain Security Without Driving Away Millennials

Ah, millennials. The generation everyone loves to hate (seriously, who do they think they are, with their selfies and their…

Read More

August 25, 2015 | DTEX Systems

Your Defense Against the Top 2015 Security Threats: Level Head, Open Eyes

Heading into September, it's hard not to see certain recurring themes in this year's data breaches. Over and over again,…

Read More

August 20, 2015 | DTEX Systems

Three M&A Security Threats to Keep on Your Radar

It's official: your company is going through a merger or acquisition. As a security professional, that scares you, and understandably…

Read More

August 5, 2015 | DTEX Systems

Is $150 Enough to Buy Your Employees?

We were pretty enthralled by last week's article over at The Register, which covered a survey that claimed that one…

Read More

July 30, 2015 | DTEX Systems

Privileged User Monitoring: A Critical Piece of Insider Threat Prevention

They say that trust is a critical part of any healthy relationship. But when you hear so many tales of…

Read More

July 22, 2015 | DTEX Systems

An Affair They’d Rather Forget: Ashley Madison Victim to Hack

Extramarital affair matchmaking site Ashley Madison was breached yesterday, and the details surrounding the case should make excellent fodder for…

Read More

July 14, 2015 | DTEX Systems

Humans Behaving Badly: Why Insiders Pose the Greatest Security Threat

In today's increasingly digitized, cloud-based world, insider threat is a REALLY, REALLY big problem.

Read More

July 14, 2015 | DTEX Systems

Retreat to Move Forward: Conquering the Shadow IT Risk

Have you ever wondered what might be hiding in the shadows of your network? Do you really know what your…

Read More

July 14, 2015 | DTEX Systems

The "Simple Solution" to Insider Threat?

Recently, we found ourselves somewhat enthralled by this article from IT World Canada.

Read More