Edward Snowden. Movies have been made, books have been written and tweets have been tweeted. We know more about him now than ever before. And yet if Snowden still worked
The Healthcare Industry Has a Remedy for Insider Threats
Most companies could benefit from emulating the healthcare industry when it comes to identifying insider threats through risk assessments and other best practices.
A New Way to Hunt Insider Threats
One of the questions our parent company Fishtech Group has been asked repeatedly during its nationwide Threat Hunt Tour is: “How can we do a better job of mitigating our
Haystax Product Update: Communications and Logging
System and tenant administrators in any Haystax solution need multiple ways to communicate with their users, and they also need fine-grained visibility in the activities of users via in-built system
Continuous Evaluation Could Save Billions, RAND Says
The U.S. government could save up to $30 billion in just over two decades if it were to adopt continuous evaluation of personnel with security clearances instead of sticking with
Finding Ana Montes: A Haystax Use Case
Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for many only two
A Risk-Based, Data-Driven Approach to Continuous Vetting
A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly available data sources
Haystax Product Update: Empowering Tenant Admins
Every Haystax solution is deployed is its own tenant, and each tenant has unique app combinations and user profiles — even tailored lexicons, theming and color schemes — that reflect