Insider Threat

So far in this series, we’ve reviewed some of the more widely deployed solutions for security analytics, and explained how and why they fail most of the time. In this…

Security analytics

Haystax Technology CEO Bryan Ware, a regular contributor to Network World, recently published his insights into lessons learned from the front lines of managing risk from insider threats risk management.…

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now…

Insider Threat, Security Analytics

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…

Security watch lists exist for good reasons, whether to keep track of people suspected of having ties to terrorist organizations or to track known sex offenders, felons or substance abusers.…

Bayesian Networks are among the more sophisticated capabilities applied to security analytics, relying as they do on decision science and statistics rather than software engineering expertise. But in many implementations…

Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in…

By Hannah Hein and Tom Read Financial services institutions use various tools and techniques to prevent fraudulent activity and to quickly mitigate the impact of fraud when it does occur.…

In high-profile shooting incidents such as those that have taken place in the US over the past few weeks, there’s almost always a close friend or family member that comes…