threat analytics

The Insider Threat Program Maturity Framework, released by the National Insider Threat Task Force (NITTF) earlier this month, is designed to enhance the 2012 National Insider Threat Policy and Minimum…

security operations center SOC

How many times have buyers of insider threat detection and response solutions heard this vendor pitch? “We bring your user data into our system so your security operations center analysts…

insider threat

We described in Part 1 of this post why access-badge data is a valuable source of evidence as to whether an employee, contractor, vendor or customer poses a risk to…

insider threat

Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at…

data

Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for…

The best insider threat mitigation programs often use combinations of analytic techniques to assess and prioritize workforce risk, according to a recent report by the Intelligence and National Security Alliance…

insider threat

Tesla CEO Elon Musk claims that at least one employee stole sensitive intellectual property and sabotaged existing operations at the electric car-maker’s battery plant in Nevada, which would constitute a…

On any given day, security operations center (SOC) analysts are confronted with streams of alerts that range in importance from highly actionable threat intelligence to screen-cluttering false positives. Each alert…

public safety

Haystax Technology has been designated as one of only a handful of public safety industry innovators by MarketsandMarkets, a B2B research and competitive intelligence firm that counts 80% of global…