Join our panel during Black Hat 2024 – Blurred Lines: Investigating the Convergence of Internal and External Threats

WORKFORCE CYBER
INTELLLIGENCE

RESOURCES

A Human-Centric Approach to Operational Awareness and Risk Management

Insider Risk Insights - DTEX Blog

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

E-books

The Insider Risk Guide to AI

The possibilities with AI are endless, but so are the security risks. It won’t just be cybercriminals and nation-states looking…

Read More
Workforce Cyber Intelligence E-book employee monitoring insider risk management resource

E-books

A Modern Approach to Employee Engagement and Well-being

Workforce Cyber Intelligence is the Future of Work and Privacy by providing insightful and actionable analytics on your organization’s workforce,…

Read More

E-books

Insider Risk Management vs. Insider Threat Surveillance

Discover 7 reasons to move to a more modern approach to Insider Risk Management.

Read More
Insider Risk Management 7 steps to zero trust Splunk e-book

E-books

An Insider Risk Management Approach to Zero Trust E-book

When Zero Trust is applied to Insider Risk Management, we must be careful to avoid past mistakes that hamper…

Read More

E-books

Zero Trust Data Loss Prevention for the Distributed Enterprise

Learn how DTEX uses Zero Trust principles in our DLP solution for a scalable, non-invasive way to help prevent data…

Read More

E-books

10 Tips to Strengthen Your Insider Threat Program

Get the right data. It's not enough to have a lot of data. You need data specifically tailored to detecting…

Read More
case study dtex provides visibility and context

E-books

The Insider Threat Kill Chain

DTEX analysts have identified the five steps present in nearly all insider attacks, known as the Insider Threat Kill Chain.

Read More