artificial intelligence

security operations center SOC

How many times have buyers of insider threat detection and response solutions heard this vendor pitch? “We bring your user data into our system so your security operations center analysts…

insider threat

Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at…

The best insider threat mitigation programs often use combinations of analytic techniques to assess and prioritize workforce risk, according to a recent report by the Intelligence and National Security Alliance…

Fishtech

Almost every organization feels vulnerable to some form of insider threat, be it from a malicious actor, a staffer who inadvertently creates an exploitable vulnerability or a negligent employee who…

Image of Cyber Fraud model on laptop

Every national security clearance investigation revolves around a simple question: “What is this person not telling me?” After all, if every applicant for a cleared job was completely honest, there…

insider threat

Tesla CEO Elon Musk claims that at least one employee stole sensitive intellectual property and sabotaged existing operations at the electric car-maker’s battery plant in Nevada, which would constitute a…

Cyber security

Commercial enterprises are increasingly turning to an integrated risk management (IRM) approach to security, rather than simply trying to meet governance, risk management and compliance (GRC) standards. The shift is…

At Haystax Technology, we are proponents and early adopters of principled approaches to machine learning (ML) and artificial intelligence (AI) for cybersecurity. We use the term ‘principled AI’ to describe what…

insider threat

Tom Read, Haystax Technology’s Vice President of Security Analytics, has been chosen to lead a breakout session at this year’s Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference in…