DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways to break in and execute attacks. The DTEX i3 Team has issued a Threat Advisory to provide insight on how malicious insiders are exploiting commonly trusted tools, such as Google ... Read More

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of AI research to nuclear trade secrets, the appetite to steal and exploit sensitive data for competitive advantage has never been greater. Espionage attempts are growing in stealth and frequency – and governments, tech, ... Read More

Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in some capacity, and all three used their insider access for nefarious purposes, got caught and were arrested. Teixeira, while with the Air National Guard, shared classified documents on social media, ... Read More
™

DTEX i³ Issues Threat Advisory for Detecting the Use of Multiple Identities

The DTEX i3 team has issued a new Threat Advisory following recent investigations linking the use of multiple personal accounts on corporate devices with side gigs and the spread of extremist materials. The i3 Threat Advisory highlights how lenient security policies surrounding personal accounts and corporate data are making organizations ... Read More
Early insider risk detection - Behavioral Risk Model

Early Insider Risk Detection Hinges on Quality Data – Not AI

DTEX recently became the first cybersecurity company to launch a dedicated AI assistant specifically for insider risk management. The Ai3 Risk Assistant democratizes nuanced behavioral data analysis to guide analysts and seriously expedite investigation times. In an increasingly competitive cyber arms race, where speed is of essence, this is a ... Read More

What is a Behavioral Risk Indicator? Demystifying Insider Risk Indicators

Insiders – the people with legitimate access to an organization’s data and systems – are the root cause of most cybersecurity incidents. As humans, insider risks are complex. Their behaviors and intentions can manifest in a multitude of ways, and they don’t always add up. An unusual action does not ... Read More

DTEX i³ Issues Threat Advisory for Mitigating Insider Abuse of Insecure Web Apps

Web applications offer powerful workforce efficiencies, but they are not without their risks. Misconfiguration of web applications can open the door to insider abuse or misuse, throwing sensitive company data and employee privacy into jeopardy. The DTEX i³ team, who provides insider risk services and publishes regular insider risk research, ... Read More
GigaOM Radar Report UEBA - DTEX OUTPERFORMER x

From Reactive to Proactive: The Power of UEBA in Insider Risk Management

User and Entity Behavior Analytics (UEBA) is evolving. What once was a stand-alone solution designed to monitor user activity has become an “integral overlay” that merges various telemetry sources to provide a comprehensive understanding of behavioral risk. With this understanding comes the ability to proactively predict anomalies rather than just ... Read More

Meet Marshall Heilman: New CEO for DTEX

DTEX Systems has a new CEO.   Meet Marshall Heilman: Former Red Teamer and Incident Responder, long-time Mandiant executive and man on a mission to deliver the best insider risk protection in the world. Marshall, welcome to DTEX. You kicked off your career by joining the U.S. Marines, where you ... Read More

Gartner® Market Guide for DLP | Why Context is King

With insider risk rising and becoming increasingly expensive, it’s becoming more incumbent on companies to figure out how they want to tackle it. Historically, one approach has been to use Data Loss Prevention (DLP) technologies. As far as cybersecurity tools go, DLP is mature, but its limitations are becoming more ... Read More
Loading...

Secure Guardrails