cybersecurity

cybersecurity

Today is the first day of Cybersecurity Awareness Month, a fitting occasion to reexamine some key principles that security organizations should keep in mind as they establish a cyber-risk mitigation…

insider threat

Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at…

Insider Threat, Security Analytics, trust score

The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal…

data

Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for…

Fishtech

Almost every organization feels vulnerable to some form of insider threat, be it from a malicious actor, a staffer who inadvertently creates an exploitable vulnerability or a negligent employee who…

Cyber security

Commercial enterprises are increasingly turning to an integrated risk management (IRM) approach to security, rather than simply trying to meet governance, risk management and compliance (GRC) standards. The shift is…

insider threat

Tom Read, Haystax Technology’s Vice President of Security Analytics, has been chosen to lead a breakout session at this year’s Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference in…

Fishtech

The Washington Business Journal and Kansas City Business Journal are among the media outlets that have published in-depth reports on Fishtech Group’s acquisition of Haystax Technology, which was announced on…

The user behavior analytics market is fragmenting into fewer ‘pure-play’ UBA vendors and a larger number of more traditional security products with core UBA technologies and features embedded in them,…