Today’s security and risk analysts have access to oceans of raw data, thanks to a proliferation of information sources, drastically improved computing power and dirt-cheap storage. Paradoxically, though, they’re having
Haystax Technology VP Comments on FY18 Insider Threat Program Language
Separate drafts of the fiscal-year 2018 National Defense Authorization Act (NDAA) are currently making their way through the House and Senate. Haystax Technology’s Vice President of Security Analytics, Tom Read,
Haystax Technology Again Makes Cybersecurity 500 List
Cybersecurity Ventures has released its latest Cybersecurity 500 list, naming Haystax Technology as a top cybersecurity company for Q2 2017. Haystax is specifically recognized for its award-winning Haystax Analytics Platform™.
More Organizations Adopting UBA, Gartner Says
Enterprises are increasingly turning to user behavior analytics (UBA) for an array of security missions, as they confront ever-more sophisticated external threats and the possibility that even their most trusted
New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies
Haystax Technology and SANS today released an industry survey titled “Defending Against the Wrong Enemy: 2017 SANS Insider Threat Survey” that illustrates the importance of managing internal threats to win
Coping with Security Data Overload in Today’s Connected World
The way we generate information about ourselves today — increasingly through social media, computer networks and connected devices — has forced security professionals to re-evaluate how they capture data, analyze
McClatchy Quotes Haystax CEO on Finding Rogue Insiders
Not too long ago, external espionage was viewed as the biggest threat to national intelligence agencies. But McClatchy national security correspondent Tim Johnson reports on a trend of rogue insiders
‘Continuous Trustworthiness’ Needs More Focus, Haystax Technology CEO Writes
Companies take time to screen their potential employees during the application process, and government-job seekers undergo many additional investigative procedures, too. And yet once an individual is hired, the vetting