WORKFORCE CYBER
INTELLLIGENCE

RESOURCES

A Human-Centric Approach to Operational Awareness and Risk Management

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Energy company case study insider risk management

Case Studies

Protecting Trusted Insiders: How an Energy Company Mitigated a Targeted Phishing Attack

How DTEX helped a large energy organization identify, understand and mitigate a targeted phishing attack.

Read More

Videos

Stop Insider Threats Like Roger

An in depth look at how DTEX protects your business from within.

Watch Now
MITRE and DTEX partnership announcement woman at computer insider threat

Solution Briefs

Insider Threat Protection for the Modern Enterprise

Legacy Insider Threat platforms rely on ‘person of interest’ identification and require time-consuming, full-time analyst interaction.

READ MORE
cost of ownership right tool for IRM blog post

Solution Briefs

Insider Threat Platform Buyers Guide

How to measure and evaluate the complex landscape of insider threat solutions and build an effective insider threat program…

Read More

E-books

10 Tips to Strengthen Your Insider Threat Program

Get the right data. It's not enough to have a lot of data. You need data specifically tailored to detecting…

Read More
woman working at cafe remote workforce security

Reports

2020 Insider Threat Report

Download the 2020 Insider Threat Report from our expert DTEX i3 Team for the year's trends on insider risk management.

Read More
Information Week webinar sports analytics for insider risk management

Webinars

Information Week Webinar: What We Can Learn from Sports Analytics

Analytics play a major role in sports performance. Watch the webinar now to learn how to implement data processes and…

Read More
case study dtex provides visibility and context

E-books

The Insider Threat Kill Chain

DTEX analysts have identified the five steps present in nearly all insider attacks, known as the Insider Threat Kill Chain.

Read More
Crawl, Walk, Run How to Kickstart your Insider Risk Program

White Papers

Finding the Disconnect: Perceptions and Behaviors of Today’s Enterprise Employees

Finding the Disconnect: Perceptions and Behaviors of Today’s Enterprise Employees As enterprise security discussions shift from the purely operational to…

Read More
Telecommunications case study for insider risk management

Case Studies

How a National Telecom Company Used DTEX to Build a Data Lineage Program and Solve More Problems with Less Noise

After several failed attempts with other tools, this customer chose DTEX to detect insider threats and establish a data lineage…

Read More
Why understanding insider risk is key to cyber resilience

Case Studies

Financial Services Organization Stops Attack Targeting a Senior Executive

Learn how DTEX's digital forensic capabilities enabled a time to resolution of under 24 hours.

Read More
Everyone as a Trusted Insider: An Intelligence Replacement for Employee Monitoring

White Papers

Everyone as a Trusted Insider: An Intelligent Replacement for Employee Monitoring

Insider threats remain a top concern for nearly half of today’s security teams, with a steady stream of headlines detailing…

Read More