Haystax Technology

security operations center SOC

How many times have buyers of insider threat detection and response solutions heard this vendor pitch? “We bring your user data into our system so your security operations center analysts…

insider threat

We described in Part 1 of this post why access-badge data is a valuable source of evidence as to whether an employee, contractor, vendor or customer poses a risk to…

data science

Two Haystax data scientists are headed to the Massachusetts Institute of Technology (MIT) in Boston to deliver a poster-style presentation at the first-ever International Conference on Probabilistic Programming, which runs…

cybersecurity

Today is the first day of Cybersecurity Awareness Month, a fitting occasion to reexamine some key principles that security organizations should keep in mind as they establish a cyber-risk mitigation…

Fishtech

Almost every organization feels vulnerable to some form of insider threat, be it from a malicious actor, a staffer who inadvertently creates an exploitable vulnerability or a negligent employee who…

A wide array of data analytics methods, tools, and techniques exist to improve the detection and mitigation of insider threats — those trusted employees who seek to harm an organization…

Cyber security

Commercial enterprises are increasingly turning to an integrated risk management (IRM) approach to security, rather than simply trying to meet governance, risk management and compliance (GRC) standards. The shift is…

insider threat

Tom Read, Haystax Technology’s Vice President of Security Analytics, has been chosen to lead a breakout session at this year’s Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference in…

Fishtech

The Washington Business Journal and Kansas City Business Journal are among the media outlets that have published in-depth reports on Fishtech Group’s acquisition of Haystax Technology, which was announced on…