Insider Intelligence & Investigations
DTEX i3 works side by side with customers to respond to our platform’s findings, identify internal risks, evaluate their severity and ultimately protect from malicious, negligent and compromised users while preventing data loss. The founding members of DTEX i3 bring a combined 100+ years of experience in advanced insider threat and data loss research, analysis and hunting from notable companies, including Deloitte, Raytheon, Symantec, Sophos and more.
Download the DTEX i3 Solution Brief to learn more about the full set of Insider Risk Services.
Counter-Insider Risk Research & Thought Leadership
DTEX i3 brings together experienced behavioral researchers, consultants and an elite team of insider threat investigators to create an intelligence-driven, investigation–ready capability. The team publishes counter-insider threat research as blogs, quarterly digests and in-depth reports focused on human behaviors to help business leaders, security practitioners and regulatory bodies better understand, design, deploy and manage workforce cyber intelligence and security initiatives.
Read DTEX i3’s latest research with the Ponemon Institute.
The latest on Workforce Cyber Intelligence
2020 Insider Threat Report
How 2020 changes employee behavior and put enterprises on high alert.Learn More
2021 State of Workforce Privacy & Risk Report
Organizations are struggling to balance workforce privacy against the need to monitor employees to reduce workforce risk.Learn More
The Facebook Whistleblower and the Insider Threat Kill Chain
The reverberations from Facebook whistleblower Frances Haugen’s campaign will be felt for months to come. While the focus needs to be on the degree of transparency of the company’s internal research on the risks posed by the social network, it’s worth examining this story from an insider threat perspective.Learn More
Stories from the Field - Kaseya Revil Ransomware Attacks
In this post, we’ll dive into the details of how we worked to respond to the Kaseya REvil ransomware attacks, and the specific steps my team and I took to help our customers boost their defenses.Learn More
DTEX C-Int Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices
Cryptocurrency has garnered a significant amount of attention over the past year, as there’s been an evolution from it being an unfamiliar and highly scrutinized digital payment method to a serious investment opportunity for even the world’s most savvy investors.Learn More
Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities
On Wednesday, March 23rd the National Counter-Intelligence and Security Center (NCSC) issued updated insider threat mitigation guidelines for all United States Critical Infrastructure entities.Learn More
Smile, You're on Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed
The recent breach of Silicon Valley start-up Verkada by the hacker collective APT 69420 using an administrative account feels like Groundhog Day. Certainly, the fact that a username and password for an administrator account was available on the internet is a huge problem.Learn More