Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • Pandemic Response
    • Insider Threat Mitigation
    • Safety & Security
      • For Law Enforcement
      • For Fire Safety
      • For School Safety
      • For Emergency Management
      • For Event Security
    • Enterprise Security
    • Cyber Crime Prevention
    • Continuous Vetting
    • Consulting Services
  • WHO WE ARE
    • Leadership Team
    • About Fishtech Group (Parent Company)
    • Our Data Science
    • Haystax Partner Program
    • Careers
    • CASE STUDIES
    • AWARDS
  • BLOG
  • RESOURCES
  • CONTACT
  • LOGIN
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring UBA user behavior analytics

security analytics

Technology & Data Science Counting the Costs of an Insider Attack
September 9, 2020in Technology & Data Science 0 Comments 0 Likes

Counting the Costs of an Insider Attack

Companies can save anywhere from $100,000 to $2 million by proactively preventing a data breach or other insider attack, according to a recent industry survey. The survey, published in early

by John Boatman
Policy & Practice CDM Publishes Haystax Article on Proactive Insider Threat Mitigation
July 13, 2020in Policy & Practice 0 Comments 0 Likes

CDM Publishes Haystax Article on Proactive Insider Threat Mitigation

Most organizations detect their biggest insider threats only after an incident has occurred. This is a less-than-ideal situation – certainly no one wants their program to be purely reactive –

by John Boatman
Product Updates assessment
April 15, 2020in Product Updates 0 Comments 0 Likes

Haystax Product Update: Insider Threat and Facility Assessments

Seasoned security professionals who want to understand the full spectrum of risk facing their most valued assets know to start by conducting an assessment. These go by various names, including

by John Boatman
Product Updates Using Risk Analysis to Mitigate State and Local Cyber Threats
March 18, 2020in Product Updates 0 Comments 0 Likes

Using Risk Analysis to Mitigate State and Local Cyber Threats

Escalating ransomware and other cyber-attacks over the last year have exposed glaring vulnerabilities in state and local government IT networks. During 2019, there were a reported 140 ransomware attacks targeting

by John Boatman
Company News Haystax Wins Triple Gold in Cybersecurity Excellence Awards
February 21, 2020in Company News 0 Comments 0 Likes

Haystax Wins Triple Gold in Cybersecurity Excellence Awards

The 2020 Cybersecurity Excellence Awards have been announced, and Haystax has won Gold awards in all three categories for which it was nominated. Haystax, a business unit of Fishtech Group,

by John Boatman
Success Stories Securing the Super Bowl
January 27, 2020in Success Stories 0 Comments 0 Likes

Securing the Super Bowl

When the Kansas City Chiefs and San Francisco 49ers face off against each other at Super Bowl LIV next Sunday, all eyes will NOT be on the field. In secure

by John Boatman
Technology & Data Science Can Employee Wellness Programs Help Avert an Insider Attack?
January 17, 2020in Technology & Data Science 0 Comments 0 Likes

Can Employee Wellness Programs Help Avert an Insider Attack?

By Hannah Hein Many of us spend more of our waking moments working than any other single activity. Which means our bosses probably know more about our routines, attitudes and

by Hannah Hein
Policy & Practice Insider Threat Mitigation: The ‘Whole’ Story
December 18, 2019in Policy & Practice 0 Comments 0 Likes

Insider Threat Mitigation: The ‘Whole’ Story

Could Mohammad al-Shamrani have been detected before his recent attack on Naval Air Station Pensacola? Insider risk expert Val LeTellier thinks so. The attacker, a Saudi Air Force officer, killed

by John Boatman
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 13
Next

The Latest at Haystax

Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Insider Threat Program Lessons Learned
Insider Threat Program Lessons Learned

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (145)
  • Policy & Practice (62)
  • Product Updates (45)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

571-297-3800

Contact Us

Haystax / Fishtech Northern Virginia
8251 Greensboro Dr., Suite 1000, McLean, VA 22102
Fishtech Headquarters
13333 Holmes Rd., Kansas City, MO 64146
Cyber Defense Center
13323 Holmes Rd., Kansas City, MO 64146

Haystax is a wholly owned subsidiary of Fishtech Group. Fishtech Group is a data-driven cybersecurity services provider ensuring our clients’ secure digital transformation.

Contact Us

© Haystax 2021 - A Fishtech Group, LLC Company. All Rights Reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}