risk management

On any given day, security operations center (SOC) analysts are confronted with streams of alerts that range in importance from highly actionable threat intelligence to screen-cluttering false positives. Each alert…

security analytics

Is the European Union’s General Data Protection Regulation (GDPR) a game-changer for security analytics? The regulation enters into force on May 25, and in this regard its 99 articles and…

Haystax Technology

One World Identity (OWI) has named Haystax Technology as a key player in its 2018 Identity Landscape. OWI, an identity research and strategy company founded in 2016, included Haystax in…

insider threat

Intelligence and security analysts who monitor threats on a daily basis will be able to pinpoint their organizations’ biggest risks with greater fidelity and speed, thanks to recent workflow and…

cybersecurity

Haystax Technology has been named a 2017 Security Innovation Network (SINET) 16 Innovator, a designation as one of the most innovative and compelling companies in cybersecurity. Each year SINET’s Steering…

insider threat

Separate drafts of the fiscal-year 2018 National Defense Authorization Act (NDAA) are currently making their way through the House and Senate. Haystax Technology’s Vice President of Security Analytics, Tom Read,…

The explosive growth of cloud-based services and mobile devices in the workplace has rendered conventional approaches to cybersecurity risk management virtually obsolete, requiring a more adaptive and continuous strategy towards…

Cyber security

Embedded in Jamie Dimon’s recent revelation that one of his foreign-exchange traders used a mobile device to make a $100-million trade was an important message about individual trustworthiness as a…

Security analytics

Companies take time to screen their potential employees during the application process, and government-job seekers undergo many additional investigative procedures, too. And yet once an individual is hired, the vetting…