Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

Insider Threat

Technology & Data Science The Problem with Financial Fraud Detection (and How to Improve It)
August 1, 2016in Technology & Data Science 0 Comments 1 Likes

The Problem with Financial Fraud Detection (and How to Improve It)

Financial services institutions use various tools and techniques to prevent fraudulent activity and to quickly mitigate the impact of fraud when it does occur. Research and experience suggest, however, that

by Kirk Cerny
Company News SourceSecurity: Haystax CEO Discusses Identifying Threat Actors Before They Act
July 21, 2016in Company News 0 Comments 0 Likes

SourceSecurity: Haystax CEO Discusses Identifying Threat Actors Before They Act

In high-profile shooting incidents such as those that have taken place in the US over the past few weeks, there’s almost always a close friend or family member that comes

by Haystax
Policy & Practice Companies need to go beyond minimum insider threat standards, Haystax Technology CEO Tells InsideDefense
July 18, 2016in Policy & Practice 0 Comments 0 Likes

Companies need to go beyond minimum insider threat standards, Haystax Technology CEO Tells InsideDefense

In May the Pentagon published a change to the National Industrial Security Operating Manual (NISPOM), requiring contractors to “establish and maintain an insider threat program to detect, deter and mitigate

by Haystax
Policy & Practice NISPOM 2 Adds Insider Threat Rule, But Does It Go Far Enough?
July 14, 2016in Policy & Practice 0 Comments 0 Likes

NISPOM 2 Adds Insider Threat Rule, But Does It Go Far Enough?

After years of deliberation, the Department of Defense has published Change 2 to its National Industrial Security Operating Manual (NISPOM). With this release, DoD requires the cleared community to formally

by Kirk Cerny
Technology & Data Science Haystax Scientists to Present “Model-First” Framework Enhancements at International Workshops
July 5, 2016in Technology & Data Science 0 Comments 0 Likes

Haystax Scientists to Present “Model-First” Framework Enhancements at International Workshops

Papers describe Bayesian probabilistic solutions to insider threat risk assessment and intelligence analysis argument modeling McLean, VA – July 5, 2016 – Haystax Technology scientists will present three papers at

by John Boatman
Technology & Data Science Managing cyber alert overload: how to find high-priority threat signals amid the noise
May 23, 2016in Technology & Data Science 0 Comments 3 Likes

Managing cyber alert overload: how to find high-priority threat signals amid the noise

A new study by FedScoop finds that one-third of government and industry IT professionals surveyed say they receive more than 1,000 cyber-threat alerts per day, with 10 percent saying they

by John Boatman
Technology & Data Science Haystax Technology CEO Bryan Ware Talks Risk Models at Insider Threat Summit 2016
April 7, 2016in Technology & Data Science 0 Comments 1 Likes

Haystax Technology CEO Bryan Ware Talks Risk Models at Insider Threat Summit 2016

Hundreds of cybersecurity professionals descended upon Monterey, CA last week for the second annual Insider Threat Summit to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation

by John Boatman
Company News Insider Threat Summit Announces Haystax CTO Bryan Ware as a Featured Speaker
January 16, 2016in Company News 0 Comments 0 Likes

Insider Threat Summit Announces Haystax CTO Bryan Ware as a Featured Speaker

Haystax Technology Chief Technology Officer, Bryan Ware, has been announced as a speaker at the second annual Insider Threat Summit, an event that provides insights to some of the most

by Kirk Cerny
Prev

Posts navigation

  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
Next

The Latest at Haystax

A New Way to Hunt Insider Threats
A New Way to Hunt Insider Threats
School Domain Awareness Defined
School Domain Awareness Defined
Haystax Product Update: Communications and Logging
Haystax Product Update: Communications and Logging

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (66)
  • Product Updates (48)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}