By David A. Sanders A growing number of companies are using commercially available electronic information (CAEI) to assess risk from employees and contractors working in their environments. According to a
Can Employee Wellness Programs Help Avert an Insider Attack?
By Hannah Hein Many of us spend more of our waking moments working than any other single activity. Which means our bosses probably know more about our routines, attitudes and
Insider Threat Mitigation: The ‘Whole’ Story
Could Mohammad al-Shamrani have been detected before his recent attack on Naval Air Station Pensacola? Insider risk expert Val LeTellier thinks so. The attacker, a Saudi Air Force officer, killed
Finding Edward Snowden: A Haystax Use Case
By Hannah Hein Edward Snowden. Movies have been made, books have been written and tweets have been tweeted. We know more about him now than ever before. And yet if
A New Way to Hunt Insider Threats
One of the questions our parent company Fishtech Group has been asked repeatedly during its nationwide Threat Hunt Tour is: “How can we do a better job of mitigating our
Continuous Evaluation Could Save Billions, RAND Says
The U.S. government could save up to $30 billion in just over two decades if it were to adopt continuous evaluation of personnel with security clearances instead of sticking with
Finding Ana Montes: A Haystax Use Case
By Hannah Hein Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for
A Risk-Based, Data-Driven Approach to Continuous Vetting
By Kevin Kiernan A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly