The Point

The Haystax Technology Blog

Add baseball’s 2017 World Series to the list of large-scale sporting events for which Haystax Technology has provided real-time event security monitoring. This year’s Major League Baseball (MLB) championship took…

Today’s security and risk analysts have access to oceans of raw data, thanks to a proliferation of information sources, drastically improved computing power and dirt-cheap storage. Paradoxically, though, they’re having…

insider threat

Intelligence and security analysts who monitor threats on a daily basis will be able to pinpoint their organizations’ biggest risks with greater fidelity and speed, thanks to recent workflow and…

Anyone who has worked long enough in the data analytics and high-tech industries will have a favorite story about some new technology that was subjected to a degree of hype…

artificial intelligence

Some impressive people have said bearish things recently about the use of artificial intelligence (AI) in cybersecurity. A recent example is Heather Adkins, who for 15 years has been director…

insider threat

Companies across a wide spectrum of industries continue to wrestle with how to implement a well-designed insider threat program. The US government has provided guidelines that help but, as we’ve…

insider threat

Is Lord Varys, the enigmatic eunuch, a threat to Daenerys Targaryen’s army? As any Game of Thrones fan knows, Varys is currently an advisor to Daenerys. With the help of…

Enterprises are increasingly turning to user behavior analytics (UBA) for an array of security missions, as they confront ever-more sophisticated external threats and the possibility that even their most trusted…