Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
Zero Trust Meets Insider Risk Management

March 28, 2024 | Kellie Roessler

Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in…

Read More

November 17, 2022 | Lynsey Wolf

Cybercrime is the New Covid

Covid-19 is sooo 2020! Data breaches, ransomware, and cybercrime are trending this year, and sadly, it doesn’t seem like…

Read More
employee stress and insider threats blog post

November 15, 2022 | Armaan Mahbod

Stories from the Field: The Scare Factor Continues to Grow for Super Malicious Insiders

Over the last few years, executive teams and board members have become increasingly aware of the risk malicious insiders pose…

Read More
Insider Threat Management and Protection software spider graph solutions page

November 10, 2022 | Armaan Mahbod

DTEX Delivers Visibility into User Behavior and Phishing Activity

Over the past few years, phishing attacks have grown increasingly sophisticated. Early phishing methods could best be described as…

Read More
Globe News

November 9, 2022 | Rajan Koo

Workforce Cyber Intelligence and Security News Digest — October 2022

It’s hard to believe we are less than two months from the end of 2022, as the year continues to…

Read More
Manufacturing case study for insider risk management blog post

November 8, 2022 | Rajan Koo

Balancing Security and Privacy to Protect a Global Manufacturer from Insider Risk

Protecting sensitive data from insider threats is a board-level issue in companies today. This is particularly true when an innovative…

Read More
Telecommunications case study Insider Risk Management blog post

November 2, 2022 | Armaan Mahbod

Case Study: DTEX Helps a Telecom Company Cut Through the Noise to Focus on What Matters Most

A major telecom company based in the Asia-Pacific region had launched a large-scale publicly funded project to upgrade its telecommunications…

Read More
Global Financial Services case study for Insider Risk Management blog post

October 20, 2022 | Andy London

Case Study: DTEX Helps a Global Financial Services Institution Mitigate Insider Threats

Insider threats are a problem for almost every industry, but financial services companies have always been—and will continue to…

Read More
Globe News

October 11, 2022 | Rajan Koo

Workforce Cyber Intelligence and Security News Digest—Products, Partners, and More 2022

Who can believe we have less than three months until the end of 2022? The momentum behind DTEX continues at…

Read More

October 6, 2022 | Rajan Koo

CyberSecurity Breakthrough Awards Recognizes DTEX as “User Behavior Analytics Platform of the Year"

We are thrilled to announce that DTEX’s Workforce Cyber Intelligence & Security platform was named User Behavior Analytics Platform…

Read More
MITRE and DTEX partnership announcement woman at computer insider threat

October 4, 2022 | Rajan Koo

Mitigating Malicious Insider Threats in a Hybrid World

Over the past two years, IT and cybersecurity teams have faced the challenge of protecting data while employees work almost…

Read More

September 29, 2022 | Rajan Koo

Reducing Insider Risk Through Employee Empathy

We have written before about the Great Resignation and the risk of people taking sensitive data to their new…

Read More
Insider Risk Management in healthcare technology case study blog post

September 23, 2022 | Armaan Mahbod

The Increasing Insider Risk of Emerging Healthcare Technology

Earlier this month, the Health Sector Cybersecurity Coordination Center (HC3) issued a grave warning about the security implications of…

Read More