Bayesian networks

Can organizations identify insider threats or high-risk individuals using network data alone? Consider that many security software solutions today are optimized to perform network log monitoring and aggregation. They excel…

Cyber security

Embedded in Jamie Dimon’s recent revelation that one of his foreign-exchange traders used a mobile device to make a $100-million trade was an important message about individual trustworthiness as a…

Constellation

Following the rollout of several new capabilities focused on insider threats and behavioral analytics, Haystax Technology’s software development team has deployed a number of functional enhancements to core apps in…

Security analytics

Bayesian modeling, machine learning and rules-based systems are often cited as three of the most useful technologies for security analytics applications. The problem is that they are often poorly implemented,…

Haystax Technology’s Constellation Analytics Platform™ has won the 2017 Cybersecurity Excellence Award in the Security Analytics product category. The excellence awards are an annual competition honoring individuals, products and companies…

Haystax Technology’s Constellation Analytics Platform™ now gives users the ability to run data through more than one risk model, a major upgrade that gives them greater flexibility in deploying the…

security analytics

Haystax Technology’s Constellation Analytics Platform™ has been named a finalist in the Security Analytics product category for the 2017 Cybersecurity Excellence Awards. The awards honor individuals, products and companies that…

This is the second in a series of blog posts that will look at how common objections to the use of Bayesian networks can be overcome by clear thinking and…

Cyber security

The Washington Post has published a detailed article on Fishtech’s strategic investment in Haystax Technology, which was announced this morning. Fishtech, led by Gary Fish, a Kansas City-based entrepreneur and…