Insider Threat

Gaussian processes

For purposes of scientific discovery, the field of insider-threat detection often lacks sufficient amounts of time-series training data. Moreover, the limited data that are available are quite noisy. For instance, Greitzer…

On any given day, security operations center (SOC) analysts are confronted with streams of alerts that range in importance from highly actionable threat intelligence to screen-cluttering false positives. Each alert…

cyber

DCA Live has named Haystax Technology as one of its 2018 Red Hot Cyber Companies. The awards were granted, says DCA Live, to the fastest growing companies in cybersecurity in…

insider threats

Haystax Technology today released a first-of-its-kind report, Insider Threats In 2018: Predictions On What To Look For To Minimize Your Risk, based on interviews with nearly 1,500 cybersecurity professionals over…

Cybersecurity

Haystax Technology has been chosen as a Finalist for the 2018 Cybersecurity Excellence Awards, in the category of Most Innovative Cybersecurity Company between 50 and 100 employees. The Excellence Awards…

Haystax Technology

One World Identity (OWI) has named Haystax Technology as a key player in its 2018 Identity Landscape. OWI, an identity research and strategy company founded in 2016, included Haystax in…

insider threat

Haystax Technology and Syntelligent Analytic Solutions, LLC (Syntelligent) are pleased to announce that they have signed a non-exclusive Value-Added Reseller (VAR) agreement. Under the terms of the agreement, Syntelligent will…

Insider threats

Trusted insiders can harm an enterprise in all kinds of ways, from intellectual property theft, financial fraud and data breaches to espionage, sabotage and even terrorism. Moreover, the root causes…

Critics of machine learning (ML) often point out that it can’t come close to emulating a subject-matter expert working at his or her maximum potential. Sure, ML powers our smart…