The Point

The Haystax Technology Blog

insider threat

We described in Part 1 of this post why access-badge data is a valuable source of evidence as to whether an employee, contractor, vendor or customer poses a risk to…

domain awareness; field reporting

Police patrols, school resource officers and other field-deployed personnel who need to share intelligence and incident reports with their commanders now can use a new mobile app — Field Reports…

cybersecurity

Today is the first day of Cybersecurity Awareness Month, a fitting occasion to reexamine some key principles that security organizations should keep in mind as they establish a cyber-risk mitigation…

insider threat

Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at…

Insider Threat, Security Analytics, trust score

The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal…

data

Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for…

Constellation for Emergency Management

Federal, state and local emergency management agencies (EMAs) along the mid-Atlantic seaboard are bracing for the arrival Hurricane Florence, which appears to be one of the region’s strongest storms in…

Security operations teams in search of deeper threat hunting capabilities and more streamlined investigations of workforce risks will find the enhancements they seek in the latest release of Haystax Technology’s…