security analytics

Security Analytics

The newest application in Haystax Technology’s Constellation Analytics Platform provides users with a powerful way to visualize and manage real-time security analytics outputs and threat data generated from the Constellation…

Insider Threat, Security Analytics

Organizations attempting to implement a world-class insider threat program must ensure their focus is on prevention rather than detection, writes Haystax Technology CEO Bryan Ware in his most recent Security…

So far in this series, we’ve reviewed some of the more widely deployed solutions for security analytics, and explained how and why they fail most of the time. In this…

Haystax Technology has been recognized by Corporate LiveWire’s Innovation & Excellence Awards 2017 as the Most Outstanding Analytics & Cybersecurity Company. Corporate LiveWire, which provides business professionals and individuals in…

Security analytics

Haystax Technology CEO Bryan Ware, a regular contributor to Network World, recently published his insights into lessons learned from the front lines of managing risk from insider threats risk management.…

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now…

Insider Threat, Security Analytics

What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month…

Bayesian Networks are among the more sophisticated capabilities applied to security analytics, relying as they do on decision science and statistics rather than software engineering expertise. But in many implementations…

Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in…