Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

Analytics

Technology & Data Science UBA Is Just Getting Warmed Up
October 30, 2017in Technology & Data Science 0 Comments 1 Likes

UBA Is Just Getting Warmed Up

Anyone who has worked long enough in the data analytics and high-tech industries will have a favorite story about some new technology that was subjected to a degree of hype

by Kirk Cerny
Technology & Data Science artificial intelligence
October 20, 2017in Technology & Data Science 0 Comments 0 Likes

Beyond Machine Learning: Using Models in AI for Security

Some impressive people have said bearish things recently about the use of artificial intelligence (AI) in cybersecurity. A recent example is Heather Adkins, who for 15 years has been director

by Kirk Cerny
Company News CSO logo
October 2, 2017in Company News 0 Comments 2 Likes

CSO: Avoiding Hype Around User Behavior Analytics

User behavior analytics (UBA) is enjoying its own moment of high expectations in the security risk community. But many hot technologies and techniques before it (like fuzzy logic and Google

by Haystax
Company News Cybersecurity
August 14, 2017in Company News 0 Comments 1 Likes

Haystax Technology Again Makes Cybersecurity 500 List

Cybersecurity Ventures has released its latest Cybersecurity 500 list, naming Haystax Technology as a top cybersecurity company for Q2 2017. Haystax is specifically recognized for its award-winning Haystax Analytics Platform™.

by Haystax
Technology & Data Science More Organizations Adopting UBA, Gartner Says
August 9, 2017in Technology & Data Science 0 Comments 1 Likes

More Organizations Adopting UBA, Gartner Says

Enterprises are increasingly turning to user behavior analytics (UBA) for an array of security missions, as they confront ever-more sophisticated external threats and the possibility that even their most trusted

by John Boatman
Technology & Data Science New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies
August 1, 2017in Technology & Data Science 0 Comments 0 Likes

New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies

Haystax Technology and SANS today released an industry survey titled “Defending Against the Wrong Enemy: 2017 SANS Insider Threat Survey” that illustrates the importance of managing internal threats to win

by John Boatman
Technology & Data Science Coping with Security Data Overload in Today’s Connected World
July 10, 2017in Technology & Data Science 0 Comments 0 Likes

Coping with Security Data Overload in Today’s Connected World

The way we generate information about ourselves today — increasingly through social media, computer networks and connected devices — has forced security professionals to re-evaluate how they capture data, analyze

by John Boatman
Technology & Data Science Insider Threat, Security Analytics
June 23, 2017in Technology & Data Science 0 Comments 0 Likes

Why We Need More Shades of Gray in Security

Few things in life can be expressed in black and white terms. Sure, a light switch is either on or it’s off; one baseball team wins the World Series each

by Kirk Cerny
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
Next

The Latest at Haystax

Using Commercially Available Data to Detect Insider Threats
Using Commercially Available Data to Detect Insider Threats
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 2

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (67)
  • Product Updates (48)
  • Success Stories (32)
  • Technology & Data Science (52)
  • Uncategorized (1)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}