security analytics

Haystax risk-mitigation software products support missions as dissimilar as critical infrastructure protection and insider threat mitigation. At the core of these diverse applications, though, is a single analytics platform designed…

security operations center SOC

How many times have buyers of insider threat detection and response solutions heard this vendor pitch? “We bring your user data into our system so your security operations center analysts…

insider threat

We described in Part 1 of this post why access-badge data is a valuable source of evidence as to whether an employee, contractor, vendor or customer poses a risk to…

insider threat

Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at…

Insider Threat, Security Analytics, trust score

The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal…

data

Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for…

The best insider threat mitigation programs often use combinations of analytic techniques to assess and prioritize workforce risk, according to a recent report by the Intelligence and National Security Alliance…

Fishtech

Almost every organization feels vulnerable to some form of insider threat, be it from a malicious actor, a staffer who inadvertently creates an exploitable vulnerability or a negligent employee who…

Image of Cyber Fraud model on laptop

Every national security clearance investigation revolves around a simple question: “What is this person not telling me?” After all, if every applicant for a cleared job was completely honest, there…