Could Mohammad al-Shamrani have been detected before his recent attack on Naval Air Station Pensacola? Insider risk expert Val LeTellier thinks so. The attacker, a Saudi Air Force officer, killed
Finding Edward Snowden: A Haystax Use Case
Edward Snowden. Movies have been made, books have been written and tweets have been tweeted. We know more about him now than ever before. And yet if Snowden still worked
Continuous Evaluation Could Save Billions, RAND Says
The U.S. government could save up to $30 billion in just over two decades if it were to adopt continuous evaluation of personnel with security clearances instead of sticking with
A Risk-Based, Data-Driven Approach to Continuous Vetting
A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly available data sources
Most UBA Doesn’t Actually Focus on the User
For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In
Multiple-Persona Disorder: Understanding All Your Insider Threats
Enterprises with insider threat mitigation programs often focus primarily on detecting and responding to malicious actors. At best, they may subdivide their threats into either malicious or negligent personas. These
Haystax Wins Cybersecurity Excellence Gold Award
Haystax, a Fishtech Group company, has won a top spot in the 2019 Cybersecurity Excellence Awards, the third such recognition in as many years. Another company in which Fishtech is
Small Businesses Most Vulnerable to Insider Fraud
Employee fraud and abuse cost companies roughly 5% of their annual revenues on average, but small companies suffer disproportionately higher losses due to their trusting cultures and the relatively broad