Dtex Systems
CrowdStrike Threat Hunting Report Reveals Growing Stealth of Insider Threats
CrowdStrike’s 2024 Threat Hunting Report echoes many of the findings from DTEX i3’s 2024 Insider Risk Investigations Report. The fact is, the lines between internal and external threats are rapidly blurring. Nation ...
Black Hat 2024: Why Knowing Your Users is the Ultimate Defense
Proactive insider risk management is the name of the game, and DTEX Systems’ Blurred Lines event at Black Hat made such clear. Those in attendance no doubt have Black Hat 2024 in ...
How to Get Buy-In for Your Insider Risk Management Program
Insider risk is a critical yet sometimes misunderstood or overlooked aspect of business risk. Many organizations lack robust Insider Risk Management (IRM) programs, relying on point products like Data Loss Prevention (DLP), ...
Why Third-Party Insider Risk is an Overlooked Threat
Businesses have any number of people with access to their network at any given time. They have employees, yes. But they also have vendors, partners, contractors, and others – all with varying ...
DTEX i³ Issues New Threat Advisory for Disrupting Foreign Interference
The DTEX Insider Intelligence and Investigations (i3) team has released a new threat advisory to help organizations detect, deter, and disrupt insider threat cases involving foreign interference. The advisory includes important Potential ...
The Value of HR in Your Insider Risk Management Program
Companies hire people, and while every one of those individuals presents a potential risk, not all (hopefully none) will manifest as an insider threat to the company. As a human challenge, one ...
How Behavioral Intelligence Can Combat Foreign Interference
Foreign interference is arguably the biggest threat facing national security today, as adversaries increasingly weaponize insiders to advance their strategic objectives. DTEX first revealed the gravity of the threat in the 2024 ...
DTEX i3 Issues Threat Advisory for Mitigating Third-Party Zoom Risk
Video conferencing applications like Zoom have become ubiquitous with the remote workforce, but they can also introduce a new vector for insider risk. The DTEX i3 team has observed an increase in ...

The Rise of AI and Blended Attacks: Key Takeaways from RSAC 2024
The 2024 RSA Conference can be summed up in two letters: AI. AI was everywhere. It was the main topic of more than 130 sessions. Almost every company with a booth in ...
User Behavior Analytics: Why False Positives are NOT the Problem
The axiom “garbage in, garbage out” has been around since the early days of computer science and remains apropos today to the data associated with user behavior analytics and insider risk management ...