Tom Read

A wide array of data analytics methods, tools, and techniques exist to improve the detection and mitigation of insider threats — those trusted employees who seek to harm an organization…

insider threat

Separate drafts of the fiscal-year 2018 National Defense Authorization Act (NDAA) are currently making their way through the House and Senate. Haystax Technology’s Vice President of Security Analytics, Tom Read,…

Dark Reading logo

Organizations that succeed in tackling insider threats have done so by building mitigation programs with full engagement and support from both leadership and employees, says Tom Read, Haystax Technology’s VP…

cybersecurity; insider threat; white house

Detecting insider threats before they cause harm is, of course, a daunting challenge. In response, the US government has moved aggressively over the last five years to deploy tools on…