Financial services institutions use various tools and techniques to prevent fraudulent activity and to quickly mitigate the impact of fraud when it does occur. Research and experience suggest, however, that
In May the Pentagon published a change to the National Industrial Security Operating Manual (NISPOM), requiring contractors to “establish and maintain an insider threat program to detect, deter and mitigate
After years of deliberation, the Department of Defense has published Change 2 to its National Industrial Security Operating Manual (NISPOM). With this release, DoD requires the cleared community to formally
Papers describe Bayesian probabilistic solutions to insider threat risk assessment and intelligence analysis argument modeling McLean, VA – July 5, 2016 – Haystax Technology scientists will present three papers at
Hundreds of cybersecurity professionals descended upon Monterey, CA last week for the second annual Insider Threat Summit to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation
Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.