Splunk & DTEX Partner to Deliver Noise-free Human Telemetry to the SOC. READ THE NEWS HERE.

WORKFORCE CYBER
INTELLIGENCE

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

August 27, 2021 | Armaan Mahbod

Stories from the Field – Unusual Insider Activity: Not Always Malicious

Working with DTEX customers is incredibly rewarding – I’ve helped security teams identify and thwart numerous malicious insiders and prevent…

Read More

August 11, 2021 | Jonathan Daly

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were…

Read More

August 4, 2021 | Jonathan Daly

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they…

Read More

July 23, 2021 | Jonathan Daly

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user…

Read More

July 15, 2021 | Jonathan Daly

VicTrack & DTEX: Security Product for Business Continuity Planning?

Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits…

Read More

July 7, 2021 | Jonathan Daly

What Is a Next-Gen Insider Threat Solution?

Historically, insider threat management took the form of “point solutions" for specific issues. Today, a next-gen product must address genuine…

Read More

June 1, 2021 | Jonathan Daly

DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals…

Read More

March 31, 2021 | Rajan Koo

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

Learn more about the insider threat mitigation guidelines for all United States Critical Infrastructure entities issued by the National Counter-Intelligence…

Read More
The Cyber Test Range at the A3C

March 4, 2021 | Melissa Stevens

DTEX Helps the A3C “Uplift Cyber Security Resilience”

On February 23, 2021 DTEX was excited to join a group of industry experts and distinguished guests in the launch…

Read More

February 8, 2021 | Jonathan Daly

DLP for the Virtual Enterprise with DTEX InTERCEPT

Legacy Endpoint Data Loss Prevention (DLP) solutions have left organizations with a mountain of challenges and many headaches. With the…

Read More

January 29, 2021 | Jonathan Daly

Insider Risk Mitigation Strategies – New Gartner Market Guide

On December 29th Gartner analysts Jonathan Care, Brent Predovich, and Paul Furtado published the first ever Market Guide on Insider Risk…

Read More
insider threat at Tesla

January 26, 2021 | Jonathan Daly

Insiders Strike Again at Tesla… or did they?

News broke on January 22 that Tesla has filed a federal lawsuit accusing Alex Khatilov of stealing upwards of 26,000…

Read More

January 26, 2021 | Jonathan Daly

The 5 Reasons Why Enterprises Are Upgrading to Modern Endpoint DLP

Companies worldwide have spent billions of dollars on first generation endpoint data loss prevention (DLP) technologies, hoping it would be…

Read More

December 9, 2020 | Jonathan Daly

2021 Remote Workforce Security Report: Organizations Still Lack Confidence in Security Practices

Even with news of successful vaccines in production, most of us know that Covid-19, and the challenges brought along with…

Read More

November 12, 2020 | Rajan Koo

2020 Insider Threat Report - Conclusion

The 2020 DTEX Insider Threat Report shows that the Work From Home movement has helped reveal a blind spot in…

Read More

November 10, 2020 | Rajan Koo

The Insider Threat Kill Chain – Obfuscation

In cybersecurity, the kill chain refers to the sequential steps an adversary must complete in a successful attack. Stopping the…

Read More

October 22, 2020 | Rajan Koo

The Insider Threat Kill Chain - Aggregation

In the previous postings on the Insider Threat Kill Chain we covered how malicious insiders (whether persistent insider threats or…

Read More

October 20, 2020 | Rajan Koo

2020 Insider Threat Report - Give & Take

We previously discussed the dramatic increase in obfuscation activities found in the DTEX 2020 Insider Threat Behavior Report. More than…

Read More

October 12, 2020 | Rajan Koo

The Insider Threat Kill Chain - Circumvention

In our previous post on the Insider Threat Kill Chain we discussed how indicators of Reconnaissance efforts are different for…

Read More

October 6, 2020 | Rajan Koo

2020 Insider Threat Report - Hide & Seek

As noted earlier, the DTEX 2020 Insider Threat Behavior Report surveyed hundreds of customers and Global 5000 organizations to learn…

Read More