Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • Insider Threat
    • Corporate Security
    • Public Safety
      • For Law Enforcement
      • For School Safety
      • For Event Security
      • For Emergency Management
      • For Fire Safety
    • Continuous Evaluation
    • Pandemic Response
  • CUSTOMERS
  • ABOUT
    • Leadership Team
    • About Fishtech Group (Parent Company)
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
  • BLOG
  • RESOURCES
  • CONTACT
  • LOGIN
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring UBA user behavior analytics

Technology & Data Science

Technology & Data Science Two Essential Tools for Successful Insider Risk Mitigation – Part 2
October 30, 2020in Technology & Data Science 0 Comments 0 Likes

Two Essential Tools for Successful Insider Risk Mitigation – Part 2

By David Sanders In Part 1 of this post we explored the basic characteristics of user activity monitoring (UAM), security information and event management (SIEM), user and entity behavioral analytics

by David Sanders
Technology & Data Science Two Essential Tools for Successful Insider Risk Mitigation – Part 1
October 11, 2020in Technology & Data Science 0 Comments 0 Likes

Two Essential Tools for Successful Insider Risk Mitigation – Part 1

By David Sanders A common question among companies seeking to mitigate the risk of an insider attack is: “What tools should we buy for our mitigation program to be successful?”

by David Sanders
Technology & Data Science Counting the Costs of an Insider Attack
September 9, 2020in Technology & Data Science 0 Comments 0 Likes

Counting the Costs of an Insider Attack

Companies can save anywhere from $100,000 to $2 million by proactively preventing a data breach or other insider attack, according to a recent industry survey. The survey, published in early

by John Boatman
Technology & Data Science Can Employee Wellness Programs Help Avert an Insider Attack?
January 17, 2020in Technology & Data Science 0 Comments 0 Likes

Can Employee Wellness Programs Help Avert an Insider Attack?

By Hannah Hein Many of us spend more of our waking moments working than any other single activity. Which means our bosses probably know more about our routines, attitudes and

by Hannah Hein
Technology & Data Science Self-Driving Cars and Insider Risk
December 27, 2019in Technology & Data Science 0 Comments 0 Likes

Self-Driving Cars and Insider Risk

Research into autonomous cars is kicking into high gear. Companies like Google’s Waymo, Argo AI, Uber ATG, Tesla, GM Cruise and many others have made lots of progress, but they

by Chriss Knisley
Technology & Data Science School Domain Awareness Defined
October 21, 2019in Technology & Data Science 0 Comments 0 Likes

School Domain Awareness Defined

✓ School safety assessments conducted on-site using mobile devices. ✓ A detailed catalog of campus data showing everything from floor plans to key contacts to reunification protocols. ✓ Instantaneous alerts

by John Boatman
Technology & Data Science A Risk-Based, Data-Driven Approach to Continuous Vetting
September 18, 2019in Technology & Data Science 0 Comments 0 Likes

A Risk-Based, Data-Driven Approach to Continuous Vetting

By Kevin Kiernan A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly

by Kevin Kiernan
Technology & Data Science Multiple-Persona Disorder: Understanding All Your Insider Threats
April 30, 2019in Technology & Data Science 0 Comments 0 Likes

Multiple-Persona Disorder: Understanding All Your Insider Threats

Enterprises with insider threat mitigation programs often focus primarily on detecting and responding to malicious actors. At best, they may subdivide their threats into either malicious or negligent personas. These

by John Boatman
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
Next

The Latest at Haystax

Using Commercially Available Data to Detect Insider Threats
Using Commercially Available Data to Detect Insider Threats
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 2

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (146)
  • Policy & Practice (63)
  • Product Updates (45)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

571-297-3800

Contact Us

Haystax / Fishtech Northern Virginia
8251 Greensboro Dr., Suite 1000, McLean, VA 22102
Fishtech Headquarters
13333 Holmes Rd., Kansas City, MO 64146
Cyber Defense Center
13323 Holmes Rd., Kansas City, MO 64146

Haystax is a wholly owned subsidiary of Fishtech Group. Fishtech Group is a data-driven cybersecurity services provider ensuring our clients’ secure digital transformation.

Contact Us

© Haystax 2021 - A Fishtech Group, LLC Company. All Rights Reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}