Bayesian networks

security analytics

Haystax Technology’s Constellation Analytics Platform™ has been named a finalist in the Security Analytics product category for the 2017 Cybersecurity Excellence Awards. The awards honor individuals, products and companies that…

This is the second in a series of blog posts that will look at how common objections to the use of Bayesian networks can be overcome by clear thinking and…

Cyber security

The Washington Post has published a detailed article on Fishtech’s strategic investment in Haystax Technology, which was announced this morning. Fishtech, led by Gary Fish, a Kansas City-based entrepreneur and…

Bayesian Network

In an earlier blog post we discussed the advantages of using Bayesian Networks as a representation for reasoning in complex problem domains. Despite these advantages, there are many who argue…

Insider Threat, Security Analytics

Organizations attempting to implement a world-class insider threat program must ensure their focus is on prevention rather than detection, writes Haystax Technology CEO Bryan Ware in his most recent Security…

So far in this series, we’ve reviewed some of the more widely deployed solutions for security analytics, and explained how and why they fail most of the time. In this…

Rules-based systems use ‘if-then’ rules to derive actions. For example, a fact that ‘Sally is 22 and unemployed’ is matched to a rule that ‘If a person is between 18…

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now…

UPDATE: Haystax Technology was awarded 2nd runner-up for the Michael Dean Best Paper Award at STIDS 2014. The award recognizes innovativeness and domain thought leadership that advances the state of the…