Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for many only two
A Risk-Based, Data-Driven Approach to Continuous Vetting
A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly available data sources
Haystax Product Update: Empowering Tenant Admins
Every Haystax solution is deployed is its own tenant, and each tenant has unique app combinations and user profiles — even tailored lexicons, theming and color schemes — that reflect
Most UBA Doesn’t Actually Focus on the User
For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In
The View from a DHS OpEx
Every two years or so, the U.S. Department of Homeland Security’s Science and Technology Directorate conducts what it calls an Urban Operational Experimentation, or OpEx, in a major metropolitan area.
Haystax Product Update: Inviting New Users
Last year, one of Haystax’s state-level customers was required to register several thousand new users in a very short period of time, to meet a legislatively-mandated statewide safety assessment initiative.
Haystax Product Update: Improved Critical Asset Protection
Security teams tasked with maintaining complete domain awareness of their most critical facilities will find greater flexibility and useful new features in recent product releases of our Haystax Analytics Platform.
Multiple-Persona Disorder: Understanding All Your Insider Threats
Enterprises with insider threat mitigation programs often focus primarily on detecting and responding to malicious actors. At best, they may subdivide their threats into either malicious or negligent personas. These