Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

Haystax Analytics

Technology & Data Science Three Weaknesses of Rules-Based Systems
September 6, 2016in Technology & Data Science 0 Comments 1 Likes

Three Weaknesses of Rules-Based Systems

Rules-based systems use ‘if-then’ rules to derive actions. For example, a fact that ‘Sally is 22 and unemployed’ is matched to a rule that ‘If a person is between 18

by Kirk Cerny
Technology & Data Science Machine Learning vs. Model-First Approaches to Analytics
August 31, 2016in Technology & Data Science 0 Comments 0 Likes

Machine Learning vs. Model-First Approaches to Analytics

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now

by Kirk Cerny
Technology & Data Science Making Bayesian Networks Accessible
August 22, 2016in Technology & Data Science 0 Comments 1 Likes

Making Bayesian Networks Accessible

Bayesian Networks are among the more sophisticated capabilities applied to security analytics, relying as they do on decision science and statistics rather than software engineering expertise. But in many implementations

by Ryan Couch
Technology & Data Science Haystax Scientists to Present “Model-First” Framework Enhancements at International Workshops
July 5, 2016in Technology & Data Science 0 Comments 0 Likes

Haystax Scientists to Present “Model-First” Framework Enhancements at International Workshops

Papers describe Bayesian probabilistic solutions to insider threat risk assessment and intelligence analysis argument modeling McLean, VA – July 5, 2016 – Haystax Technology scientists will present three papers at

by John Boatman
Policy & Practice Network World: Cyber hygiene isn’t enough, says Haystax Technology CEO Bryan Ware
June 23, 2016in Policy & Practice 0 Comments 0 Likes

Network World: Cyber hygiene isn’t enough, says Haystax Technology CEO Bryan Ware

Like human hygiene, organizations must maintain regular cyber hygiene for healthy outcomes, but it’s critical they don’t neglect the tools and processes that mitigate cyber risk — the most serious

by John Boatman
Technology & Data Science Managing cyber alert overload: how to find high-priority threat signals amid the noise
May 23, 2016in Technology & Data Science 0 Comments 3 Likes

Managing cyber alert overload: how to find high-priority threat signals amid the noise

A new study by FedScoop finds that one-third of government and industry IT professionals surveyed say they receive more than 1,000 cyber-threat alerts per day, with 10 percent saying they

by John Boatman
Technology & Data Science Haystax Technology CEO Bryan Ware Talks Risk Models at Insider Threat Summit 2016
April 7, 2016in Technology & Data Science 0 Comments 1 Likes

Haystax Technology CEO Bryan Ware Talks Risk Models at Insider Threat Summit 2016

Hundreds of cybersecurity professionals descended upon Monterey, CA last week for the second annual Insider Threat Summit to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation

by John Boatman
Company News Haystax Technology Named Most Innovative Analytics & Cybersecurity Company
April 5, 2016in Company News 0 Comments 1 Likes

Haystax Technology Named Most Innovative Analytics & Cybersecurity Company

Haystax Technology has been recognized by Corporate LiveWire’s 2016 Innovation & Excellence Awards as the Most Innovative Analytics & Cybersecurity Company. Corporate LiveWire, which provides business professionals and individuals in

by Kirk Cerny
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 12
Next

The Latest at Haystax

Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Insider Threat Program Lessons Learned
Insider Threat Program Lessons Learned
Six Tips for Boosting Your Insider Threat Deterrence Capabilities
Six Tips for Boosting Your Insider Threat Deterrence Capabilities

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (67)
  • Product Updates (48)
  • Success Stories (32)
  • Technology & Data Science (52)
  • Uncategorized (1)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}