Most companies could benefit from emulating the healthcare industry when it comes to identifying insider threats through risk assessments and other best practices.
A New Way to Hunt Insider Threats
One of the questions our parent company Fishtech Group has been asked repeatedly during its nationwide Threat Hunt Tour is: “How can we do a better job of mitigating our
Haystax Product Update: Communications and Logging
System and tenant administrators in any Haystax solution need multiple ways to communicate with their users, and they also need fine-grained visibility in the activities of users via in-built system
Continuous Evaluation Could Save Billions, RAND Says
The U.S. government could save up to $30 billion in just over two decades if it were to adopt continuous evaluation of personnel with security clearances instead of sticking with
Finding Ana Montes: A Haystax Use Case
By Hannah Hein Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for
A Risk-Based, Data-Driven Approach to Continuous Vetting
By Kevin Kiernan A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly
Haystax Product Update: Empowering Tenant Admins
Every Haystax solution is deployed is its own tenant, and each tenant has unique app combinations and user profiles — even tailored lexicons, theming and color schemes — that reflect
Most UBA Doesn’t Actually Focus on the User
For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In