Technology & Data Science

When introduced to the idea of security analytics, most people feel as though they intuitively ‘get it.’ After all, what’s not to like about detailed intelligence that helps you keep your…

By Hannah Hein and Tom Read Financial services institutions use various tools and techniques to prevent fraudulent activity and to quickly mitigate the impact of fraud when it does occur.…

Papers describe Bayesian probabilistic solutions to insider threat risk assessment and intelligence analysis argument modeling McLean, VA – July 5, 2016 – Haystax Technology scientists will present three papers at…

A new study by FedScoop finds that one-third of government and industry IT professionals surveyed say they receive more than 1,000 cyber-threat alerts per day, with 10 percent saying they…

Hundreds of cybersecurity professionals descended upon Monterey, CA last week for the second annual Insider Threat Summit to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation…

By Marvin Marin One of the thorniest aspects of cybersecurity is how it’s impacted by an organization’s supply chain.  A security manager may never know the pedigree of each chip,…

In the near future, police, fire and EMS will all be able to rely on the First Responder Network Authority (FirstNet), a first-of-its-kind network that will be both dedicated and…

By Marvin Marin, Haystax Technology Program Manager and Cybersecurity Expert Due to the mobile nature of many workforces, IT support personnel and security managers are required to provide remote access…

By Marvin Marin, Haystax Technology Program Manager and Cybersecurity Expert Security Operation Centers (SOCs) are built on the concept of managing and monitoring a bulwark of layered defenses. This works…