WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read MoreCountering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read MoreThe Insider Threat Kill Chain: 5 Steps to Watch Out For
As a company that's been fighting the insider threat for more than 15 years, we've been in the game long…
Read MoreHow to Maintain Security Without Driving Away Millennials
Ah, millennials. The generation everyone loves to hate (seriously, who do they think they are, with their selfies and their…
Read MoreYour Defense Against the Top 2015 Security Threats: Level Head, Open Eyes
Heading into September, it's hard not to see certain recurring themes in this year's data breaches. Over and over again,…
Read MoreThree M&A Security Threats to Keep on Your Radar
It's official: your company is going through a merger or acquisition. As a security professional, that scares you, and understandably…
Read MoreIs $150 Enough to Buy Your Employees?
We were pretty enthralled by last week's article over at The Register, which covered a survey that claimed that one…
Read MorePrivileged User Monitoring: A Critical Piece of Insider Threat Prevention
They say that trust is a critical part of any healthy relationship. But when you hear so many tales of…
Read MoreAn Affair They’d Rather Forget: Ashley Madison Victim to Hack
Extramarital affair matchmaking site Ashley Madison was breached yesterday, and the details surrounding the case should make excellent fodder for…
Read MoreHumans Behaving Badly: Why Insiders Pose the Greatest Security Threat
In today's increasingly digitized, cloud-based world, insider threat is a REALLY, REALLY big problem.
Read MoreRetreat to Move Forward: Conquering the Shadow IT Risk
Have you ever wondered what might be hiding in the shadows of your network? Do you really know what your…
Read MoreThe "Simple Solution" to Insider Threat?
Recently, we found ourselves somewhat enthralled by this article from IT World Canada.
Read More