Insider Intelligence & Investigations
DTEX i3 works side by side with customers to respond to our platform’s findings, identify internal risks, evaluate their severity and ultimately protect from malicious, negligent and compromised users while preventing data loss. The founding members of DTEX i3 bring a combined 100+ years of experience in advanced insider threat and data loss research, analysis and hunting from notable companies, including Deloitte, Raytheon, Symantec, Sophos and more.
Download the DTEX i3 Solution Brief to learn more about the full set of Insider Risk Services.
Counter-Insider Risk Research & Thought Leadership
DTEX i3 brings together experienced behavioral researchers, consultants and an elite team of insider threat investigators to create an intelligence-driven, investigation–ready capability. The team publishes counter-insider threat research as blogs, quarterly digests and in-depth reports focused on human behaviors to help business leaders, security practitioners and regulatory bodies better understand, design, deploy and manage workforce cyber intelligence and security initiatives.
Read DTEX i3’s latest research with the Ponemon Institute.
The latest on Workforce Cyber Intelligence
The reverberations from Facebook whistleblower Frances Haugen’s campaign will be felt for months to come. While the focus needs to be on the degree of transparency of the company’s internal research on the risks posed by the social network, it’s worth examining this story from an insider threat perspective.Learn More
In this post, we’ll dive into the details of how we worked to respond to the Kaseya REvil ransomware attacks, and the specific steps my team and I took to help our customers boost their defenses.Learn More
Cryptocurrency has garnered a significant amount of attention over the past year, as there’s been an evolution from it being an unfamiliar and highly scrutinized digital payment method to a serious investment opportunity for even the world’s most savvy investors.Learn More
On Wednesday, March 23rd the National Counter-Intelligence and Security Center (NCSC) issued updated insider threat mitigation guidelines for all United States Critical Infrastructure entities.Learn More
The recent breach of Silicon Valley start-up Verkada by the hacker collective APT 69420 using an administrative account feels like Groundhog Day. Certainly, the fact that a username and password for an administrator account was available on the internet is a huge problem.Learn More