Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

artificial intelligence

Technology & Data Science Gaussian processes
March 20, 2018in Technology & Data Science 0 Comments 0 Likes

Gaussian Processes with Spectral Mixture Kernels to Implicitly Capture Hidden Structure from Data

For purposes of scientific discovery, the field of insider-threat detection often lacks sufficient amounts of time-series training data. Moreover, the limited data that are available are quite noisy. For instance, Greitzer

by Kirk Cerny
Product Updates Haystax Product Update: Workflow-Driven Analytics for Actionable Threat Hunting
March 19, 2018in Product Updates 0 Comments 0 Likes

Haystax Product Update: Workflow-Driven Analytics for Actionable Threat Hunting

On any given day, security operations center (SOC) analysts are confronted with streams of alerts that range in importance from highly actionable threat intelligence to screen-cluttering false positives. Each alert

by John Boatman
Company News cyber
February 28, 2018in Company News 0 Comments 0 Likes

Haystax Technology is Red Hot Cyber Awardee

DCA Live has named Haystax Technology as one of its 2018 Red Hot Cyber Companies. The awards were granted, says DCA Live, to the fastest growing companies in cybersecurity in

by Haystax
Policy & Practice Security Analytics and the GDPR’s ‘Right to Explanation’
February 26, 2018in Policy & Practice 0 Comments 0 Likes

Security Analytics and the GDPR’s ‘Right to Explanation’

Is the European Union’s General Data Protection Regulation (GDPR) a game-changer for security analytics? The regulation enters into force on May 25, and in this regard its 99 articles and

by Kirk Cerny
Company News cybersecurity
February 8, 2018in Company News 0 Comments 1 Likes

Haystax Technology Takes Gold in Cybersecurity Excellence

Haystax Technology has been named the top company in its category in the 2018 Cybersecurity Excellence Awards. Appropriately enough during this Winter Olympics season, Haystax was named Gold Winner as

by Haystax
Company News Cybersecurity
February 2, 2018in Company News 0 Comments 1 Likes

Haystax Technology is Finalist for 2018 Cybersecurity Excellence Award

Haystax Technology has been chosen as a Finalist for the 2018 Cybersecurity Excellence Awards, in the category of Most Innovative Cybersecurity Company between 50 and 100 employees. The Excellence Awards

by Haystax
Technology & Data Science Insider threats
January 8, 2018in Technology & Data Science 0 Comments 3 Likes

Mitigating Insider Threats Using Bayesian Models

Trusted insiders can harm an enterprise in all kinds of ways, from intellectual property theft, financial fraud and data breaches to espionage, sabotage and even terrorism. Moreover, the root causes

by Kirk Cerny
Technology & Data Science Machine Learning: Expertise vs. Coverage
December 26, 2017in Technology & Data Science 0 Comments 1 Likes

Machine Learning: Expertise vs. Coverage

Critics of machine learning (ML) often point out that it can’t come close to emulating a subject-matter expert working at his or her maximum potential. Sure, ML powers our smart

by Haystax
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
Next

The Latest at Haystax

Using Commercially Available Data to Detect Insider Threats
Using Commercially Available Data to Detect Insider Threats
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 2

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (67)
  • Product Updates (48)
  • Success Stories (32)
  • Technology & Data Science (52)
  • Uncategorized (1)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}