Analytics

Security analytics

Haystax Technology CEO Bryan Ware, a regular contributor to Network World, recently published his insights into lessons learned from the front lines of managing risk from insider threats risk management.…

Rules-based systems use ‘if-then’ rules to derive actions. For example, a fact that ‘Sally is 22 and unemployed’ is matched to a rule that ‘If a person is between 18…

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now…

Insider Threat, Security Analytics

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…

Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in…

Haystax Technology has been recognized by Corporate LiveWire’s 2016 Innovation & Excellence Awards as the Most Innovative Analytics & Cybersecurity Company. Corporate LiveWire, which provides business professionals and individuals in…

McLean, VA, September 10, 2014 – Haystax Technology is proud to have been selected to exhibit at the Intelligence Community (IC) Cloud Technology Expo at CIA Headquarters in Langley, VA…