Analytics

Bayesian Network

In an earlier blog post we discussed the advantages of using Bayesian Networks as a representation for reasoning in complex problem domains. Despite these advantages, there are many who argue…

So far in this series, we’ve reviewed some of the more widely deployed solutions for security analytics, and explained how and why they fail most of the time. In this…

Haystax Technology has been recognized by Corporate LiveWire’s Innovation & Excellence Awards 2017 as the Most Outstanding Analytics & Cybersecurity Company. Corporate LiveWire, which provides business professionals and individuals in…

Security analytics

Haystax Technology CEO Bryan Ware, a regular contributor to Network World, recently published his insights into lessons learned from the front lines of managing risk from insider threats risk management.…

Rules-based systems use ‘if-then’ rules to derive actions. For example, a fact that ‘Sally is 22 and unemployed’ is matched to a rule that ‘If a person is between 18…

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now…

Insider Threat, Security Analytics

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…

Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in…

Haystax Technology has been recognized by Corporate LiveWire’s 2016 Innovation & Excellence Awards as the Most Innovative Analytics & Cybersecurity Company. Corporate LiveWire, which provides business professionals and individuals in…