Scanning for Flaws, Scoring for Security

Scanning for Flaws, Scoring for Security

Is it fair to judge an organization's information security posture simply by looking at its Internet-facing assets for weaknesses commonly sought after and exploited by attackers, such as outdated software or accidentally ...

9/4/18 – Dtex, Insider Threat, Privacy News: Dtex Announces Record Year, Adds New CFO and NSA Veteran to Team, Human Error Drives UK Data Breach Increase

Increasing insider threat rates that include incidents caused by malicious actors and negligent humans drove demand for user behavior intelligence during our fiscal 2018 year, which lead to a record-setting 12 month ...

Monday, Aug. 6, Dtex in the News: The Pervasive Insider Threat, GDPR Creates Privileged User Security Problems, Vulnerable Humans Behind UnityPoint Data Breach

The Dtex 2018 Insider Threat Intelligence Report continues to lead industry discussions about how frequently the insider threat occurs in public and private sector organizations. Last week, CSO’s Christopher Burgess dove into ...

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing ...

Monday, June 4, Dtex in the News: Got Vulnerable People? Facebook has 2 Billion, Dtex Provides Dark Reading Advice on How to Protect Them

When thinking about the insider threat, it is easy to focus on Edward Snowden, Chelsea Manning, and lawsuits between companies like Uber and Waymo. This is because the term itself conjures images ...