What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month
Making Bayesian Networks Accessible
Bayesian Networks are among the more sophisticated capabilities applied to security analytics, relying as they do on decision science and statistics rather than software engineering expertise. But in many implementations
Three Security Analytics Approaches That (Mostly) Don’t Work
Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in
Putting the Security in Security Analytics
When introduced to the idea of security analytics, most people feel as though they intuitively ‘get it.’ After all, what’s not to like about detailed intelligence that helps you keep your
The Problem with Financial Fraud Detection (and How to Improve It)
Financial services institutions use various tools and techniques to prevent fraudulent activity and to quickly mitigate the impact of fraud when it does occur. Research and experience suggest, however, that
SourceSecurity: Haystax CEO Discusses Identifying Threat Actors Before They Act
In high-profile shooting incidents such as those that have taken place in the US over the past few weeks, there’s almost always a close friend or family member that comes
Companies need to go beyond minimum insider threat standards, Haystax Technology CEO Tells InsideDefense
In May the Pentagon published a change to the National Industrial Security Operating Manual (NISPOM), requiring contractors to “establish and maintain an insider threat program to detect, deter and mitigate
NISPOM 2 Adds Insider Threat Rule, But Does It Go Far Enough?
After years of deliberation, the Department of Defense has published Change 2 to its National Industrial Security Operating Manual (NISPOM). With this release, DoD requires the cleared community to formally