Technology & Data Science

Bayesian Network

In an earlier blog post we discussed the advantages of using Bayesian Networks as a representation for reasoning in complex problem domains. Despite these advantages, there are many who argue…

Insider Threat, Security Analytics

Organizations attempting to implement a world-class insider threat program must ensure their focus is on prevention rather than detection, writes Haystax Technology CEO Bryan Ware in his most recent Security…

So far in this series, we’ve reviewed some of the more widely deployed solutions for security analytics, and explained how and why they fail most of the time. In this…

Security analytics

Haystax Technology CEO Bryan Ware, a regular contributor to Network World, recently published his insights into lessons learned from the front lines of managing risk from insider threats risk management.…

Rules-based systems use ‘if-then’ rules to derive actions. For example, a fact that ‘Sally is 22 and unemployed’ is matched to a rule that ‘If a person is between 18…

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now…

Bayesian Networks are among the more sophisticated capabilities applied to security analytics, relying as they do on decision science and statistics rather than software engineering expertise. But in many implementations…

More than 90 percent of all school, university and hospital campuses are now equipped with video surveillance systems, and many of the remainder plan to purchase them in the near…

Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in…