Advanced Threat Analytics

Insider Threat, Security Analytics

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…

Security watch lists exist for good reasons, whether to keep track of people suspected of having ties to terrorist organizations or to track known sex offenders, felons or substance abusers.…

Bayesian Networks are among the more sophisticated capabilities applied to security analytics, relying as they do on decision science and statistics rather than software engineering expertise. But in many implementations…

Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in…

When introduced to the idea of security analytics, most people feel as though they intuitively ‘get it.’ After all, what’s not to like about detailed intelligence that helps you keep your…

By Hannah Hein and Tom Read Financial services institutions use various tools and techniques to prevent fraudulent activity and to quickly mitigate the impact of fraud when it does occur.…

In high-profile shooting incidents such as those that have taken place in the US over the past few weeks, there’s almost always a close friend or family member that comes…

In May the Pentagon published a change to the National Industrial Security Operating Manual (NISPOM), requiring contractors to “establish and maintain an insider threat program to detect, deter and mitigate…

After years of deliberation, the Department of Defense has published Change 2 to its National Industrial Security Operating Manual (NISPOM). With this release, DoD requires the cleared community to formally…