The Point

The Haystax Technology Blog

Event security

One drawback of managing major-event security is that no one talks about it when you succeed. This was certainly true of the 89th Annual Academy Awards, which took place in…

Security analytics

Haystax Technology CEO Bryan Ware has written the second of a two-part series on how three well-known security analytics approaches can be vital tools for organizations and security analysts, provided…

Security analytics

Bayesian modeling, machine learning and rules-based systems are often cited as three of the most useful technologies for security analytics applications. The problem is that they are often poorly implemented,…

Assets

Haystax Technology has rolled out new analytic capabilities that generate more detailed, accurate and timely intelligence on adverse human activities, reducing the noise and excessive false positives that plague many…

Haystax Technology’s Constellation Analytics Platform™ now gives users the ability to run data through more than one risk model, a major upgrade that gives them greater flexibility in deploying the…

Insider threat

Last fall, just three years after the massive Edward Snowden leak, Harold Martin III – another government contractor – was charged with allegedly stealing highly classified documents from the National…

Insider Threat, Security Analytics

Many policy objectives were ardently debated throughout the 2016 presidential election cycle and became polarizing issues, dividing people chiefly along party lines. By contrast, the twin issues of improved insider…

Security analytics

Bryan Ware, Haystax Technology’s CEO and a regular contributor to Network World, today published his insights on three popular security analytics approaches – Bayesian networks, machine learning and rules-based systems…