One of the questions our parent company Fishtech Group has been asked repeatedly during its nationwide Threat Hunt Tour is: “How can we do a better job of mitigating our
Finding Ana Montes: A Haystax Use Case
By Hannah Hein Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for
Most UBA Doesn’t Actually Focus on the User
For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In
Small Businesses Most Vulnerable to Insider Fraud
Employee fraud and abuse cost companies roughly 5% of their annual revenues on average, but small companies suffer disproportionately higher losses due to their trusting cultures and the relatively broad
Gleaning Deeper Insights from Badge Data – Part 1
Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at
Personal Trust Scoring Gains Acceptance
The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal
Get the Data You Need
Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for