The U.S. government could save up to $30 billion in just over two decades if it were to adopt continuous evaluation of personnel with security clearances instead of sticking with
Finding Ana Montes: A Haystax Use Case
By Hannah Hein Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for
A Risk-Based, Data-Driven Approach to Continuous Vetting
By Kevin Kiernan A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly
Haystax Product Update: Empowering Tenant Admins
Every Haystax solution is deployed is its own tenant, and each tenant has unique app combinations and user profiles — even tailored lexicons, theming and color schemes — that reflect
Most UBA Doesn’t Actually Focus on the User
For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In
GDPR, One Year Later
The European Union’s General Data Protection Regulation (GDPR), focused on the rights of individuals to protect their identities, came into effect one year ago today. What’s it been like for
Multiple-Persona Disorder: Understanding All Your Insider Threats
Enterprises with insider threat mitigation programs often focus primarily on detecting and responding to malicious actors. At best, they may subdivide their threats into either malicious or negligent personas. These
Haystax Product Update: Streamlined Data, Photo and File Management
The Haystax software development team has rolled out a number of exciting new features designed to make data, photo and file management easier and faster across several Haystax Analytics Platform