Policy & Practice

cybersecurity; insider threat; white house

Detecting insider threats before they cause harm is, of course, a daunting challenge. In response, the US government has moved aggressively over the last five years to deploy tools on…

Insider Threat, Security Analytics

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…

Security watch lists exist for good reasons, whether to keep track of people suspected of having ties to terrorist organizations or to track known sex offenders, felons or substance abusers.…

In May the Pentagon published a change to the National Industrial Security Operating Manual (NISPOM), requiring contractors to “establish and maintain an insider threat program to detect, deter and mitigate…

After years of deliberation, the Department of Defense has published Change 2 to its National Industrial Security Operating Manual (NISPOM). With this release, DoD requires the cleared community to formally…

Former Department of Homeland Security official Paul Rosenzweig has issued a long-overdue call for wholesale revisions to US homeland security doctrine, in reaction to fundamental changes in the security landscape…

Like human hygiene, organizations must maintain regular cyber hygiene for healthy outcomes, but it’s critical they don’t neglect the tools and processes that mitigate cyber risk — the most serious…

Chriss Knisley, President Haystax Technology A disturbing pattern has emerged in the recruiting tactics of hyper-violent organizations like ISIS: nearly all foot soldiers who have carried out mass-casualty attacks recently…

Haystax cybersecurity expert Marvin Marin, CISSP-ISSMP, C|CISO, CCSK, eJPT, FQNV, MBCS, was recently featured in ISACA’s newsletter for the Washington, D.C. metro area. Marin wrote about the significant value that…