Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics
PrevInsider Threat, Security AnalyticsHaystax CEO: Effective Security Analytics for Insider Threat Prevention11 October 2016Nextevent securityCal COP Helps First Responders Secure Long Beach Marathon13 October 2016
  • Policy & Practice

A Wrong Turn on Insider Threat Programs

October 12, 2016
cybersecurity; insider threat; white house

Detecting insider threats before they cause harm is, of course, a daunting challenge. In response, the US government has moved aggressively over the last five years to deploy tools on classified networks to detect potential breaches in progress, calculating that loss of classified information is its most important concern.

But do these countermeasures work? By most evidence, the focus on network-based tools or end-point sensors as a means of preserving sensitive information has been unsuccessful. Breaches are increasing significantly in size and number — the recently revealed classified information breach by an NSA contractor being just the latest example. Moreover, one study showed that over 50% of the breach alerts that do come in are false positives, taxing already overwhelmed analyst teams across multiple agencies.

To be fair, it is not possible to know how many breaches have been stopped by currently deployed tools, because most of this information has not been made public. Nonetheless, things do not appear to be moving in the right direction.

There could be many reasons for the failure. I’d like to focus on the one which I believe is the most important: the lack of a true risk-based approach to insider threat detection and deterrence. This lack of focus on risk is evident in government policy and guidance, and has led to unintended consequences — most importantly the bias towards deploying ineffective network alerting systems.

Where is the risk-based approach?

On October 7, 2011, President Obama signed the Executive Order 13587, Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information. This was the first major attempt to address security gaps in the wake of the Chelsea Manning WikiLeaks breach. While the primary focus was on securing classified networks to prevent other breaches like Manning’s from happening again, the EO also set into motion a broader insider threat requirement by standing up the National Insider Threat Task Force (NITTF). The President mandated that the NITTF establish a government-wide insider threat program, taking into account “risk levels.” What the EO meant by risk levels was not explained.

In November 2012, President Obama signed the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs. This policy set specific standards and guidelines for executive agencies and included a broader reading of insider threat — requiring that the agencies establish ‘hubs’ to analyze data from various sources, such as HR, counterintelligence, personnel security and law enforcement — thus going beyond a singular focus on classified network protection and monitoring. Noticeably absent, however, was any discussion of risk. There has been no further guidance on what the EO meant by risk levels. Instructions to the NITTF, laid out in Section C, do not mention them either.

The NITTF states that its assessments of government agency insider-threat programs take into account differing levels of agency risk, which it implies are based on such things as size of cleared population, extent of access to classified computer systems and amount of classified information. In other words, if an agency doesn’t have a lot of cleared personnel working on classified networks, the agency may not be assessed at the same strict standards. But this is different than assessing intent. For example, the US president has access to the most sensitive data; should he be considered a greater risk than someone who may be stealing drugs from evidence bins at the Drug Enforcement Agency? The NITTF definition of ‘risk-based’ appears to focus primarily on access. It does not focus on the other side of the coin, namely intent.

Theoretically, background investigations are supposed to determine a person’s possible intent. Investigations aim to figure out how vulnerable a person is to coercion, how trustworthy they are, etc. However, background investigations are ‘pass-fail,’ not graded. The person newly cleared to use a classified network is not considered riskier than an existing user, and is not monitored differently.

Continuous evaluation, which basically means constantly updating investigative data on a cleared person, is now being rolled out in some federal agencies. This will help give investigators updated information, but in the end the cleared person is either cleared to use a system or is not. There are no shades of gray. The security clearance process, therefore, is not risk-based.

We all know that banks make risk-based decisions when loaning money. This is why interest rates on credit cards differ from customer to customer. If financial institutions followed the same approach that the government uses to determine access to classified information, they would lend money at the same rates to anyone that passed, rather than failed, a credit check. Banks would have to either raise rates high enough across the board to reduce the cost of default — effectively choking off investment by good debtors — or keep rates low across the board, thus significantly increasing the cost of default. Either way, costs would be significantly higher than a world where risk-based financing is the norm.

Bias towards network monitoring

NITTF assessment criteria focus on three areas: training, process and procedure documentation, and network monitoring. We all know that training is a fairly low bar — just establish a training program in the areas outlined as important, track employees who attend, report this to the NITTF and you’ve complied with the requirement. Documentation of things like retention policies is valuable, but most organizations should already have done this years ago, as required in EO 13587.

The only assessment mandate that is tangible and difficult is the installation of “User Activity Monitoring on classified networks and procedures for protecting UAM measures and results.” Thus, many organizations believe that deploying UAM is the long pole in the tent, and if they succeed in doing so they are most of the way to compliance.

Notice that there is nothing about risk in the assessment criteria.

This emphasis, combined with increasing breaches and heightened concerns about cybersecurity, has substantially increased funding of cybersecurity projects. The money flowing into cybersecurity has obviously attracted vendors who are offering more sophisticated alert systems. The result is that cybersecurity and network monitoring are practically synonymous with insider threat. Google “insider threat tools” and you come up with long lists of cybersecurity alert systems.

What can be done?

The government is moving in the wrong direction on insider threat. As we have noted before, policy-makers need to stop and rethink their overall approach.

The best way to begin is to understand what might cause someone to become a threat in the first place, and then create a model of insider risk in the same way that the government creates risk models to predict terrorist attacks or the spread of epidemics. This model will prioritize those with highest likelihood for committing an incident, which will then inform the optimal monitoring and prevention strategies. The current focus on sensors and alerts will give way to a much more effective focus on overall risk scores and score trends.

Tom Read is Vice President for Security Analytics at Haystax Technology.

 

  • continuous evaluation
  • cybersecurity
  • Insider Threat
  • risk management
  • security risk

Related posts

Policy & Practice 2021 Insider Threat Lessons Learned
September 30, 2021in Policy & Practice 0 Comments 1 Likes

2021 Insider Threat Lessons Learned

Company News Haystax Insider Threat Expert Contributes to INSA Paper
September 21, 2021in Company News 0 Comments 0 Likes

Haystax Insider Threat Expert Contributes to INSA Paper

Product Updates Haystax Product Update: Turbocharging Asset Maps
September 13, 2021in Product Updates 0 Comments 0 Likes

Haystax Product Update: Turbocharging Asset Maps

Policy & Practice Insider Threat
September 3, 2021in Policy & Practice 0 Comments 4 Likes

Insider Threats Are Evolving – Fast

Product Updates Introducing: A Managed Service for Proactive Insider Threat Detection & Response
June 28, 2021in Product Updates 0 Comments 3 Likes

Introducing: A Managed Service for Proactive Insider Threat Detection & Response

Product Updates Assessment template builder
May 12, 2021in Product Updates 0 Comments 4 Likes

Haystax Product Update: Assessment Template Builder

Policy & Practice Using Commercially Available Data to Detect Insider Threats
April 7, 2021in Policy & Practice 0 Comments 2 Likes

Using Commercially Available Data to Detect Insider Threats

Technology & Data Science Two Essential Tools for Successful Insider Risk Mitigation – Part 1
October 11, 2020in Technology & Data Science 0 Comments 5 Likes

Two Essential Tools for Successful Insider Risk Mitigation – Part 1

Policy & Practice Insider Threat Program Lessons Learned
September 29, 2020in Policy & Practice 0 Comments 0 Likes

Insider Threat Program Lessons Learned

Policy & Practice Six Tips for Boosting Your Insider Threat Deterrence Capabilities
September 16, 2020in Policy & Practice 0 Comments 0 Likes

Six Tips for Boosting Your Insider Threat Deterrence Capabilities

Technology & Data Science Counting the Costs of an Insider Attack
September 9, 2020in Technology & Data Science 0 Comments 4 Likes

Counting the Costs of an Insider Attack

Policy & Practice school safety assessment
August 31, 2020in Policy & Practice 0 Comments 5 Likes

DoJ Deems Risk Assessments ‘Essential’ for School Safety

Success Stories Hurricanes Add to Risks in a Multi-Hazard Year
August 21, 2020in Success Stories 0 Comments 1 Likes

Hurricanes Add to Risks in a Multi-Hazard Year

Policy & Practice CDM Publishes Haystax Article on Proactive Insider Threat Mitigation
July 13, 2020in Policy & Practice 0 Comments 3 Likes

CDM Publishes Haystax Article on Proactive Insider Threat Mitigation

Company News Haystax School Safety Users to Speak at ASIS Conference
May 7, 2020in Company News 0 Comments 1 Likes

Haystax School Safety Users to Speak at ASIS Conference

Product Updates assessment
April 15, 2020in Product Updates 0 Comments 7 Likes

Haystax Product Update: Insider Threat and Facility Assessments

Policy & Practice Dark Reading: Haystax Insider Threat Expert Discusses High-Risk Assets
April 6, 2020in Policy & Practice 0 Comments 1 Likes

Dark Reading: Haystax Insider Threat Expert Discusses High-Risk Assets

Product Updates Using Risk Analysis to Mitigate State and Local Cyber Threats
March 18, 2020in Product Updates 0 Comments 2 Likes

Using Risk Analysis to Mitigate State and Local Cyber Threats

Company News Haystax Wins Triple Gold in Cybersecurity Excellence Awards
February 21, 2020in Company News 0 Comments 6 Likes

Haystax Wins Triple Gold in Cybersecurity Excellence Awards

Technology & Data Science Can Employee Wellness Programs Help Avert an Insider Attack?
January 17, 2020in Technology & Data Science 0 Comments 3 Likes

Can Employee Wellness Programs Help Avert an Insider Attack?

Product Updates Haystax Product Update: New Map Functionality
January 7, 2020in Product Updates 0 Comments 2 Likes

Haystax Product Update: New Map Functionality

Technology & Data Science Self-Driving Cars and Insider Risk
December 27, 2019in Technology & Data Science 0 Comments 6 Likes

Self-Driving Cars and Insider Risk

Policy & Practice Insider Threat Mitigation: The ‘Whole’ Story
December 18, 2019in Policy & Practice 0 Comments 0 Likes

Insider Threat Mitigation: The ‘Whole’ Story

Policy & Practice Finding Edward Snowden: A Haystax Use Case
December 6, 2019in Policy & Practice 0 Comments 3 Likes

Finding Edward Snowden: A Haystax Use Case

Policy & Practice The doctor supports a symbol of protection of health.
November 22, 2019in Policy & Practice 0 Comments 1 Likes

The Healthcare Industry Has a Remedy for Insider Threats

Company News A New Way to Hunt Insider Threats
October 23, 2019in Company News 0 Comments 1 Likes

A New Way to Hunt Insider Threats

Product Updates Haystax Product Update: Communications and Logging
October 18, 2019in Product Updates 0 Comments 3 Likes

Haystax Product Update: Communications and Logging

Policy & Practice The Lessons of Umpqua
October 1, 2019in Policy & Practice 0 Comments 0 Likes

The Lessons of Umpqua

Policy & Practice Continuous Evaluation Could Save Billions, RAND Says
September 30, 2019in Policy & Practice 0 Comments 0 Likes

Continuous Evaluation Could Save Billions, RAND Says

Policy & Practice Finding Ana Montes: A Haystax Use Case
September 24, 2019in Policy & Practice 0 Comments 0 Likes

Finding Ana Montes: A Haystax Use Case

Technology & Data Science A Risk-Based, Data-Driven Approach to Continuous Vetting
September 18, 2019in Technology & Data Science 0 Comments 0 Likes

A Risk-Based, Data-Driven Approach to Continuous Vetting

Product Updates Haystax Product Update: Empowering Tenant Admins
September 12, 2019in Product Updates 0 Comments 5 Likes

Haystax Product Update: Empowering Tenant Admins

Policy & Practice Insider Threat
July 11, 2019in Policy & Practice 0 Comments 2 Likes

Most UBA Doesn’t Actually Focus on the User

Policy & Practice GDPR, One Year Later
May 25, 2019in Policy & Practice 0 Comments 1 Likes

GDPR, One Year Later

Technology & Data Science Multiple-Persona Disorder: Understanding All Your Insider Threats
April 30, 2019in Technology & Data Science 0 Comments 1 Likes

Multiple-Persona Disorder: Understanding All Your Insider Threats

Product Updates Haystax Product Update: Streamlined Data, Photo and File Management
April 10, 2019in Product Updates 0 Comments 6 Likes

Haystax Product Update: Streamlined Data, Photo and File Management

Company News Sasi Mudigonda Joins Haystax Executive Team
March 13, 2019in Company News 0 Comments 5 Likes

Sasi Mudigonda Joins Haystax Executive Team

Company News Fishtech Partners With Chronicle on Cybersecurity
March 6, 2019in Company News 0 Comments 0 Likes

Fishtech Partners With Chronicle on Cybersecurity

Company News cybersecurity
February 22, 2019in Company News 0 Comments 1 Likes

Haystax Wins Cybersecurity Excellence Gold Award

Policy & Practice The Parkland Tragedy, One Year Later
February 14, 2019in Policy & Practice 0 Comments 0 Likes

The Parkland Tragedy, One Year Later

Technology & Data Science Fraud
January 31, 2019in Technology & Data Science 0 Comments 3 Likes

Small Businesses Most Vulnerable to Insider Fraud

Product Updates Haystax Product Update: Streamlined Assessment Workflows
December 26, 2018in Product Updates 0 Comments 4 Likes

Haystax Product Update: Streamlined Assessment Workflows

Policy & Practice Towards a More Holistic Approach to Managing School Safety Risk
December 14, 2018in Policy & Practice 0 Comments 1 Likes

Towards a More Holistic Approach to Managing School Safety Risk

Policy & Practice Insider Threat Maturity Framework: An Analysis
November 27, 2018in Policy & Practice 0 Comments 0 Likes

Insider Threat Maturity Framework: An Analysis

Product Updates Haystax Product Update: Functionality Enhancements
November 19, 2018in Product Updates 0 Comments 4 Likes

Haystax Product Update: Functionality Enhancements

Policy & Practice h
October 29, 2018in Policy & Practice 0 Comments 1 Likes

‘Last-Mile’ Workflows for Tighter SOC Responses

Technology & Data Science Gleaning Deeper Insights from Badge Data – Part 2
October 8, 2018in Technology & Data Science 0 Comments 3 Likes

Gleaning Deeper Insights from Badge Data – Part 2

Policy & Practice Cybersecurity — Lessons Learned?
October 1, 2018in Policy & Practice 0 Comments 0 Likes

Cybersecurity — Lessons Learned?

Technology & Data Science Gleaning Deeper Insights from Badge Data – Part 1
September 23, 2018in Technology & Data Science 0 Comments 1 Likes

Gleaning Deeper Insights from Badge Data – Part 1

Policy & Practice Insider Threat, Security Analytics
September 21, 2018in Policy & Practice 0 Comments 0 Likes

Personal Trust Scoring Gains Acceptance

Technology & Data Science Get the Data You Need
September 17, 2018in Technology & Data Science 0 Comments 4 Likes

Get the Data You Need

Company News x
September 7, 2018in Company News 0 Comments 1 Likes

Haystax VP Writes Article on Insider Threat Mitigation Techniques

Company News Fishtech
August 20, 2018in Company News 0 Comments 1 Likes

At the Fishtech Pro Tour: UBA for Insider Threat

Company News INSA Publishes Framework for Insider Threat Analytics
August 10, 2018in Company News 0 Comments 1 Likes

INSA Publishes Framework for Insider Threat Analytics

Product Updates Haystax Product Update: Redefining SOC Automation
July 13, 2018in Product Updates 0 Comments 1 Likes

Haystax Product Update: Redefining SOC Automation

Technology & Data Science Image of Cyber Fraud model on laptop
July 5, 2018in Technology & Data Science 0 Comments 2 Likes

How Bayesian Networks Glean Better Insights During Clearance Investigations

Technology & Data Science insider threat
June 25, 2018in Technology & Data Science 0 Comments 1 Likes

The Case of the ‘Disgruntled’ Tesla Insider

Policy & Practice Cyber security
June 12, 2018in Policy & Practice 0 Comments 0 Likes

Integrated Risk Management Comes of Age

Company News insider threat
May 25, 2018in Company News 0 Comments 1 Likes

Haystax Technology VP to Discuss Insider Threat Mitigation at DoDIIS Event

Company News Fishtech
May 24, 2018in Company News 0 Comments 0 Likes

Leading Business Journals Report on Fishtech Acquisition of Haystax Technology

Company News security risk management
May 23, 2018in Company News 0 Comments 0 Likes

Haystax Named as a ‘Top Risk Management Tool’

Technology & Data Science Gartner Sees Evolving UBA Market
May 20, 2018in Technology & Data Science 0 Comments 1 Likes

Gartner Sees Evolving UBA Market

Company News cybersecurity
May 16, 2018in Company News 0 Comments 1 Likes

Haystax Technology Named to Cybersecurity 500 List

Company News Gartner Highlights Haystax Technology in UEBA Guide
May 11, 2018in Company News 0 Comments 0 Likes

Gartner Highlights Haystax Technology in UEBA Guide

Company News cybersecurity
April 20, 2018in Company News 0 Comments 0 Likes

Haystax Technology CEO to Speak on Cybersecurity

Technology & Data Science Gaussian processes
March 20, 2018in Technology & Data Science 0 Comments 0 Likes

Gaussian Processes with Spectral Mixture Kernels to Implicitly Capture Hidden Structure from Data

Product Updates Haystax Product Update: Workflow-Driven Analytics for Actionable Threat Hunting
March 19, 2018in Product Updates 0 Comments 0 Likes

Haystax Product Update: Workflow-Driven Analytics for Actionable Threat Hunting

Company News cyber
February 28, 2018in Company News 0 Comments 0 Likes

Haystax Technology is Red Hot Cyber Awardee

Company News insider threats
February 27, 2018in Company News 0 Comments 0 Likes

Haystax Technology Study: Most Companies Feeling Vulnerable to Insider Attacks

Policy & Practice Security Analytics and the GDPR’s ‘Right to Explanation’
February 26, 2018in Policy & Practice 0 Comments 0 Likes

Security Analytics and the GDPR’s ‘Right to Explanation’

Company News cybersecurity
February 8, 2018in Company News 0 Comments 1 Likes

Haystax Technology Takes Gold in Cybersecurity Excellence

Company News Cybersecurity
February 2, 2018in Company News 0 Comments 1 Likes

Haystax Technology is Finalist for 2018 Cybersecurity Excellence Award

Company News Haystax Technology
January 31, 2018in Company News 0 Comments 1 Likes

Haystax Technology Named as Key Risk Management Platform Company

Company News insider threat
January 24, 2018in Company News 0 Comments 1 Likes

Haystax Technology and Syntelligent Sign Reseller Agreement

Technology & Data Science Insider threats
January 8, 2018in Technology & Data Science 0 Comments 3 Likes

Mitigating Insider Threats Using Bayesian Models

Technology & Data Science Machine Learning: Expertise vs. Coverage
December 26, 2017in Technology & Data Science 0 Comments 1 Likes

Machine Learning: Expertise vs. Coverage

Product Updates Haystax Product Update: Improving Assessment Functionality, User Workflows
December 20, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: Improving Assessment Functionality, User Workflows

Technology & Data Science Using AI to Extract High-Value Threat Intel from Data
November 30, 2017in Technology & Data Science 0 Comments 2 Likes

Using AI to Extract High-Value Threat Intel from Data

Company News Haystax Technology Named Red Herring 2017 Top 100 Global Winner
November 20, 2017in Company News 0 Comments 1 Likes

Haystax Technology Named Red Herring 2017 Top 100 Global Winner

Product Updates insider threat
November 8, 2017in Product Updates 0 Comments 1 Likes

Haystax Product Update: Enhanced Insider Risk Management

Technology & Data Science UBA Is Just Getting Warmed Up
October 30, 2017in Technology & Data Science 0 Comments 1 Likes

UBA Is Just Getting Warmed Up

Technology & Data Science artificial intelligence
October 20, 2017in Technology & Data Science 0 Comments 0 Likes

Beyond Machine Learning: Using Models in AI for Security

Company News cybersecurity
October 18, 2017in Company News 0 Comments 0 Likes

Haystax Technology Named 2017 SINET 16 Innovator

Company News CSO logo
October 2, 2017in Company News 0 Comments 2 Likes

CSO: Avoiding Hype Around User Behavior Analytics

Policy & Practice insider threat
September 25, 2017in Policy & Practice 0 Comments 1 Likes

Six Steps Companies Can Take to Improve Insider Threat Mitigation

Company News insider threat
September 13, 2017in Company News 0 Comments 1 Likes

Haystax Technology VP Comments on FY18 Insider Threat Program Language

Policy & Practice insider threat
September 1, 2017in Policy & Practice 0 Comments 0 Likes

Detecting an Insider Threat in Game of Thrones

Company News cybersecurity
August 25, 2017in Company News 0 Comments 0 Likes

Haystax Technology Named SINET 16 Finalist

Company News Cybersecurity
August 14, 2017in Company News 0 Comments 1 Likes

Haystax Technology Again Makes Cybersecurity 500 List

Technology & Data Science More Organizations Adopting UBA, Gartner Says
August 9, 2017in Technology & Data Science 0 Comments 1 Likes

More Organizations Adopting UBA, Gartner Says

Technology & Data Science New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies
August 1, 2017in Technology & Data Science 0 Comments 0 Likes

New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies

Policy & Practice UBA
June 28, 2017in Policy & Practice 0 Comments 0 Likes

Gartner: Cybersecurity Needs to Become More Continuous, Adaptable and Risk-Based

Company News NSA; insider threat
June 28, 2017in Company News 0 Comments 4 Likes

McClatchy Quotes Haystax CEO on Finding Rogue Insiders

Technology & Data Science Insider Threat, Security Analytics
June 23, 2017in Technology & Data Science 0 Comments 0 Likes

Why We Need More Shades of Gray in Security

Technology & Data Science Network Data is Not Enough
June 8, 2017in Technology & Data Science 0 Comments 1 Likes

Network Data is Not Enough

Company News CSO logo
May 11, 2017in Company News 0 Comments 2 Likes

Haystax Technology CTO Cited in CSO Article on ‘Security Alert Fatigue’

Technology & Data Science Cyber security
April 12, 2017in Technology & Data Science 0 Comments 1 Likes

Managing Insider Risk: Breathalyzers and Behavioral Analytics

Policy & Practice Security analytics
April 5, 2017in Policy & Practice 0 Comments 0 Likes

‘Continuous Trustworthiness’ Needs More Focus, Haystax Technology CEO Writes

Company News Dark Reading logo
March 31, 2017in Company News 0 Comments 2 Likes

Insider Threat Programs “Need Full Engagement,” Haystax Technology VP Tells Dark Reading

Technology & Data Science Insider threat
March 29, 2017in Technology & Data Science 0 Comments 0 Likes

New Haystax Technology Survey Shows Most Organizations Ill-Prepared for Insider Threats

Product Updates Haystax
March 23, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: App, Dashboard and Map Enhancements

Company News Cybersecurity
March 15, 2017in Company News 0 Comments 0 Likes

Haystax Technology Named to Latest Cybersecurity 500 List

Technology & Data Science Security analytics
February 23, 2017in Technology & Data Science 0 Comments 0 Likes

Haystax Technology Publishes Security Analytics White Paper

Product Updates Assets
February 21, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: Enhanced Behavioral Analytics

Company News Security analytics
February 13, 2017in Company News 0 Comments 0 Likes

Haystax Technology Wins Two Cybersecurity Awards Ahead of RSA Conference

Company News Haystax Technology Wins 2017 Cybersecurity Excellence Award for Security Analytics
February 8, 2017in Company News 0 Comments 0 Likes

Haystax Technology Wins 2017 Cybersecurity Excellence Award for Security Analytics

Product Updates Haystax Product Update: Multiple Model Support
February 8, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: Multiple Model Support

Company News security analytics
February 3, 2017in Company News 0 Comments 2 Likes

Haystax Named Finalist for 2017 Cybersecurity Excellence Awards

Company News Haystax Technology to Provide Security Analytics for Super Bowl
January 30, 2017in Company News 0 Comments 0 Likes

Haystax Technology to Provide Security Analytics for Super Bowl

Policy & Practice Insider threat
January 26, 2017in Policy & Practice 0 Comments 0 Likes

Haystax Technology CEO Describes Private Sector’s Insider Threat Challenges

Policy & Practice Insider Threat, Security Analytics
January 18, 2017in Policy & Practice 0 Comments 0 Likes

Insider Threat and Security Clearance Reform: A Chance to Accelerate Change

Company News Haystax Technology Lauded for Regional Security Analytics Leadership
December 28, 2016in Company News 0 Comments 1 Likes

Haystax Technology Lauded for Regional Security Analytics Leadership

Company News Cyber security
December 8, 2016in Company News 0 Comments 1 Likes

Washington Post Reports on Haystax Technology-Fishtech Partnership

Company News Haystax Technology Announces Strategic Investment and Partnership with Fishtech
December 8, 2016in Company News 0 Comments 2 Likes

Haystax Technology Announces Strategic Investment and Partnership with Fishtech

Technology & Data Science Security analytics
December 2, 2016in Technology & Data Science 0 Comments 0 Likes

Network World Cites Haystax Technology CEO in AI Piece

Company News Cybersecurity
November 22, 2016in Company News 0 Comments 1 Likes

Haystax Named Top Cybersecurity Company to Watch in 2017

Policy & Practice Cyber security
November 9, 2016in Policy & Practice 0 Comments 0 Likes

Lessons From the Financial Sector’s Approach to Cybersecurity Regulation

Product Updates Security Analytics
November 4, 2016in Product Updates 0 Comments 2 Likes

Haystax Product Update: New Dashboard App

Company News National Defense Quotes Ware on NISPOM2
October 20, 2016in Company News 0 Comments 0 Likes

National Defense Quotes Ware on NISPOM2

Company News NSA; insider threat
October 14, 2016in Company News 0 Comments 0 Likes

Politico Cites Haystax CEO on Insider Threat

Technology & Data Science Insider Threat, Security Analytics
October 11, 2016in Technology & Data Science 0 Comments 1 Likes

Haystax CEO: Effective Security Analytics for Insider Threat Prevention

Success Stories Emergency Services
October 5, 2016in Success Stories 0 Comments 0 Likes

Haystax Cal COP Featured At CESA Conference

Technology & Data Science A Security Analytics Approach That Does Work
September 29, 2016in Technology & Data Science 0 Comments 1 Likes

A Security Analytics Approach That Does Work

Company News Haystax Technology Named Most Outstanding Analytics & Cybersecurity Company
September 20, 2016in Company News 0 Comments 0 Likes

Haystax Technology Named Most Outstanding Analytics & Cybersecurity Company

Technology & Data Science Security analytics
September 9, 2016in Technology & Data Science 0 Comments 0 Likes

Network World: Haystax CEO Bryan Ware On Managing Insider Threats

Company News Haystax CEO to Speak on Building a Successful Cybersecurity Company
September 2, 2016in Company News 0 Comments 0 Likes

Haystax CEO to Speak on Building a Successful Cybersecurity Company

Technology & Data Science Machine Learning vs. Model-First Approaches to Analytics
August 31, 2016in Technology & Data Science 0 Comments 0 Likes

Machine Learning vs. Model-First Approaches to Analytics

Policy & Practice Insider Threat, Security Analytics
August 26, 2016in Policy & Practice 0 Comments 0 Likes

Is Yesterday’s Trusted Employee Today’s Insider Threat? And How Would You Know?

Technology & Data Science Making Bayesian Networks Accessible
August 22, 2016in Technology & Data Science 0 Comments 1 Likes

Making Bayesian Networks Accessible

Technology & Data Science Three Security Analytics Approaches That (Mostly) Don’t Work
August 15, 2016in Technology & Data Science 0 Comments 0 Likes

Three Security Analytics Approaches That (Mostly) Don’t Work

Technology & Data Science The Problem with Financial Fraud Detection (and How to Improve It)
August 1, 2016in Technology & Data Science 0 Comments 1 Likes

The Problem with Financial Fraud Detection (and How to Improve It)

Company News SourceSecurity: Haystax CEO Discusses Identifying Threat Actors Before They Act
July 21, 2016in Company News 0 Comments 0 Likes

SourceSecurity: Haystax CEO Discusses Identifying Threat Actors Before They Act

Policy & Practice Companies need to go beyond minimum insider threat standards, Haystax Technology CEO Tells InsideDefense
July 18, 2016in Policy & Practice 0 Comments 0 Likes

Companies need to go beyond minimum insider threat standards, Haystax Technology CEO Tells InsideDefense

Policy & Practice NISPOM 2 Adds Insider Threat Rule, But Does It Go Far Enough?
July 14, 2016in Policy & Practice 0 Comments 0 Likes

NISPOM 2 Adds Insider Threat Rule, But Does It Go Far Enough?

Technology & Data Science Haystax Scientists to Present “Model-First” Framework Enhancements at International Workshops
July 5, 2016in Technology & Data Science 0 Comments 0 Likes

Haystax Scientists to Present “Model-First” Framework Enhancements at International Workshops

Policy & Practice Network World: Cyber hygiene isn’t enough, says Haystax Technology CEO Bryan Ware
June 23, 2016in Policy & Practice 0 Comments 0 Likes

Network World: Cyber hygiene isn’t enough, says Haystax Technology CEO Bryan Ware

Technology & Data Science Managing cyber alert overload: how to find high-priority threat signals amid the noise
May 23, 2016in Technology & Data Science 0 Comments 3 Likes

Managing cyber alert overload: how to find high-priority threat signals amid the noise

Technology & Data Science Haystax Technology CEO Bryan Ware Talks Risk Models at Insider Threat Summit 2016
April 7, 2016in Technology & Data Science 0 Comments 1 Likes

Haystax Technology CEO Bryan Ware Talks Risk Models at Insider Threat Summit 2016

Company News Haystax Technology Named Most Innovative Analytics & Cybersecurity Company
April 5, 2016in Company News 0 Comments 1 Likes

Haystax Technology Named Most Innovative Analytics & Cybersecurity Company

Technology & Data Science Managing cybersecurity risks in the supply chain
March 7, 2016in Technology & Data Science 0 Comments 0 Likes

Managing cybersecurity risks in the supply chain

Company News Haystax Recognized as a Top Innovator in Cybersecurity
March 1, 2016in Company News 0 Comments 1 Likes

Haystax Recognized as a Top Innovator in Cybersecurity

Company News Haystax Selected for DHS Big Data Event on Open Source and Social Media Market Research
February 26, 2016in Company News 0 Comments 1 Likes

Haystax Selected for DHS Big Data Event on Open Source and Social Media Market Research

Technology & Data Science Haystax Offers Insight into Future of Public Safety with Development of FirstNet
February 25, 2016in Technology & Data Science 0 Comments 2 Likes

Haystax Offers Insight into Future of Public Safety with Development of FirstNet

Company News Bloomberg Visits Super Bowl Security Headquarters in CA to See Haystax Software in Action
February 5, 2016in Company News 0 Comments 1 Likes

Bloomberg Visits Super Bowl Security Headquarters in CA to See Haystax Software in Action

Company News CNBC Examines How Haystax Technology is Helping First Responders Secure Super Bowl 50 Events
January 29, 2016in Company News 0 Comments 0 Likes

CNBC Examines How Haystax Technology is Helping First Responders Secure Super Bowl 50 Events

Company News Insider Threat Summit Announces Haystax CTO Bryan Ware as a Featured Speaker
January 16, 2016in Company News 0 Comments 0 Likes

Insider Threat Summit Announces Haystax CTO Bryan Ware as a Featured Speaker

Company News Cybersecurity
January 15, 2016in Company News 0 Comments 0 Likes

Cybersecurity Ventures Ranks Haystax as a Top Cybersecurity Company to Watch in 2016

Policy & Practice Finding the Signal Amid the Noise: A Strategy for Managing Noisy Alert Systems
December 15, 2015in Policy & Practice 0 Comments 0 Likes

Finding the Signal Amid the Noise: A Strategy for Managing Noisy Alert Systems

Company News SANS logo
December 14, 2015in Company News 0 Comments 0 Likes

Haystax Cybersecurity Specialist Honored with SANS Difference Maker Award

Technology & Data Science Layers of Security: In Defense of the Web Application Layer
November 18, 2015in Technology & Data Science 0 Comments 0 Likes

Layers of Security: In Defense of the Web Application Layer

Policy & Practice Has OPM put us “Into Dangerous Hands?”
November 16, 2015in Policy & Practice 0 Comments 0 Likes

Has OPM put us “Into Dangerous Hands?”

Company News Security InfoWatch notes Haystax Technology in Award-Winning Public Safety Project
November 6, 2015in Company News 0 Comments 0 Likes

Security InfoWatch notes Haystax Technology in Award-Winning Public Safety Project

Company News Haystax to Participate in the National Fusion Center Association (NFCA) Annual Training Event
November 2, 2015in Company News 0 Comments 0 Likes

Haystax to Participate in the National Fusion Center Association (NFCA) Annual Training Event

Company News Managing School Safety in the 21st Century – Webcast
October 22, 2015in Company News 0 Comments 3 Likes

Managing School Safety in the 21st Century – Webcast

Policy & Practice The Umpqua Tragedy: Lessons Learned in School Safety
October 7, 2015in Policy & Practice 0 Comments 0 Likes

The Umpqua Tragedy: Lessons Learned in School Safety

Company News Cybersecurity Ventures Ranks Haystax as Top Cybersecurity Company
October 4, 2015in Company News 0 Comments 1 Likes

Cybersecurity Ventures Ranks Haystax as Top Cybersecurity Company

Company News Haystax to Be Featured at 2015 CESA Annual Training & Conference
September 28, 2015in Company News 0 Comments 0 Likes

Haystax to Be Featured at 2015 CESA Annual Training & Conference

Company News Center for Digital Education Reports on LASPD School Safety Assessments
September 28, 2015in Company News 0 Comments 0 Likes

Center for Digital Education Reports on LASPD School Safety Assessments

Company News LA School Report Examines Collaboration between LASPD and Haystax Technology
September 23, 2015in Company News 0 Comments 0 Likes

LA School Report Examines Collaboration between LASPD and Haystax Technology

Policy & Practice The Importance Of School Safety Planning
September 23, 2015in Policy & Practice 0 Comments 1 Likes

The Importance Of School Safety Planning

Technology & Data Science Get The Whole Picture With Multi-Layered Cybersecurity
September 20, 2015in Technology & Data Science 0 Comments 0 Likes

Get The Whole Picture With Multi-Layered Cybersecurity

Policy & Practice Maximizing Public Safety By Protecting Our Communities With Advanced Analytics
September 19, 2015in Policy & Practice 0 Comments 0 Likes

Maximizing Public Safety By Protecting Our Communities With Advanced Analytics

Company News Haystax Technology Named Finalist for Prestigious Government Contracting Awards
September 14, 2015in Company News 0 Comments 0 Likes

Haystax Technology Named Finalist for Prestigious Government Contracting Awards

Company News THE Journal highlights LASPD mobile school assessment tool, developed by Haystax Technology
September 9, 2015in Company News 0 Comments 1 Likes

THE Journal highlights LASPD mobile school assessment tool, developed by Haystax Technology

Policy & Practice 3 Common Reasons To Implement Insider Threat Management
September 3, 2015in Policy & Practice 0 Comments 0 Likes

3 Common Reasons To Implement Insider Threat Management

Policy & Practice Five Principles of Successful Enterprise Threat Management
August 26, 2015in Policy & Practice 0 Comments 0 Likes

Five Principles of Successful Enterprise Threat Management

Company News Haystax Technology CTO quoted in ThirdCertainty piece on OPM breach
August 11, 2015in Company News 0 Comments 0 Likes

Haystax Technology CTO quoted in ThirdCertainty piece on OPM breach

Product Updates Haystax Analytics Tool Could Mitigate National Security Effects of OPM Breach
August 7, 2015in Product Updates 0 Comments 0 Likes

Haystax Analytics Tool Could Mitigate National Security Effects of OPM Breach

Policy & Practice The History of Insider Threat Detection
August 1, 2015in Policy & Practice 0 Comments 0 Likes

The History of Insider Threat Detection

Company News Homeland Security Today Examines How Haystax Carbon Helps Prevent Insider Threats
July 21, 2015in Company News 0 Comments 0 Likes

Homeland Security Today Examines How Haystax Carbon Helps Prevent Insider Threats

Product Updates Insider Threat Detection: What You Don’t Know About Your Staff Will Hurt You
July 21, 2015in Product Updates 0 Comments 1 Likes

Insider Threat Detection: What You Don’t Know About Your Staff Will Hurt You

Policy & Practice Protecting The Enterprise – All of It
July 17, 2015in Policy & Practice 0 Comments 0 Likes

Protecting The Enterprise – All of It

Company News Haystax Technology to serve on panel at Cybersecurity Outlook 2016
June 26, 2015in Company News 0 Comments 0 Likes

Haystax Technology to serve on panel at Cybersecurity Outlook 2016

Company News Haystax Technology Demonstrates Next-Generation Insider Threat Detection at GEOINT 2015
June 22, 2015in Company News 0 Comments 0 Likes

Haystax Technology Demonstrates Next-Generation Insider Threat Detection at GEOINT 2015

Policy & Practice The Important Considerations of Major Event Risk Management
June 22, 2015in Policy & Practice 0 Comments 0 Likes

The Important Considerations of Major Event Risk Management

Company News Haystax Technology to Present at AFCEA Defensive Cyber Operations Symposium
June 16, 2015in Company News 0 Comments 0 Likes

Haystax Technology to Present at AFCEA Defensive Cyber Operations Symposium

Company News Haystax Technology to Demonstrate Broad Public Safety Offerings, Host First Users Session at National Homeland Security Conference in San Antonio
June 9, 2015in Company News 0 Comments 0 Likes

Haystax Technology to Demonstrate Broad Public Safety Offerings, Host First Users Session at National Homeland Security Conference in San Antonio

Product Updates Officer.com highlights new Mobile Field Interview App from Haystax Technology
June 8, 2015in Product Updates 0 Comments 2 Likes

Officer.com highlights new Mobile Field Interview App from Haystax Technology

Company News Haystax Technology to Exhibit at 2015 CIA Technology Exposition
June 1, 2015in Company News 0 Comments 0 Likes

Haystax Technology to Exhibit at 2015 CIA Technology Exposition

Company News Center for Digital Education shows how schools can leverage Haystax Technology’s School Safety Center
May 21, 2015in Company News 0 Comments 1 Likes

Center for Digital Education shows how schools can leverage Haystax Technology’s School Safety Center

Policy & Practice Terrorism Risk and Schools: Time to Take Note (Part II)
May 19, 2015in Policy & Practice 0 Comments 1 Likes

Terrorism Risk and Schools: Time to Take Note (Part II)

Policy & Practice all-hazard
May 18, 2015in Policy & Practice 0 Comments 0 Likes

The Not So Hidden Value In Continual Real Time Enterprise Threat Management

Policy & Practice The Increasing Need For Comprehensive Cybersecurity
May 16, 2015in Policy & Practice 0 Comments 0 Likes

The Increasing Need For Comprehensive Cybersecurity

Product Updates Get The Big Picture With Enterprise Threat Management
May 15, 2015in Product Updates 0 Comments 0 Likes

Get The Big Picture With Enterprise Threat Management

Policy & Practice Terrorism Risk and Schools: Time to Take Note (Part I)
May 14, 2015in Policy & Practice 0 Comments 0 Likes

Terrorism Risk and Schools: Time to Take Note (Part I)

Company News CTOVision Lauds Haystax Technology’s Approach to Analytics and Cybersecurity
May 12, 2015in Company News 0 Comments 0 Likes

CTOVision Lauds Haystax Technology’s Approach to Analytics and Cybersecurity

Company News Haystax Technology to Present at 2015 Synergy Forum
April 26, 2015in Company News 0 Comments 0 Likes

Haystax Technology to Present at 2015 Synergy Forum

Policy & Practice Why We Focus on Insider Threats
April 15, 2015in Policy & Practice 0 Comments 0 Likes

Why We Focus on Insider Threats

Company News Haystax featured in Bloomberg Business for insider threat detection
March 30, 2015in Company News 0 Comments 1 Likes

Haystax featured in Bloomberg Business for insider threat detection

Company News The AAAI recognizes Haystax paper as Honorable Mention for big data expertise
January 7, 2015in Company News 0 Comments 0 Likes

The AAAI recognizes Haystax paper as Honorable Mention for big data expertise

Company News Haystax Appoints General Peter Pace as Board Chairman
November 18, 2014in Company News 0 Comments 0 Likes

Haystax Appoints General Peter Pace as Board Chairman

Company News Haystax Selected to Present Advanced Threat Analytic Applications for Insider Threat Detection at STIDS – 2014 Conference
November 13, 2014in Company News 0 Comments 0 Likes

Haystax Selected to Present Advanced Threat Analytic Applications for Insider Threat Detection at STIDS – 2014 Conference

Company News Haystax to present at Cyber Security Finance Forum 2014
October 28, 2014in Company News 0 Comments 0 Likes

Haystax to present at Cyber Security Finance Forum 2014

Company News Haystax to Showcase Enterprise Threat Intelligence Platform at Fusion Center Conference
October 28, 2014in Company News 0 Comments 0 Likes

Haystax to Showcase Enterprise Threat Intelligence Platform at Fusion Center Conference

Success Stories Haystax Helps Florida Strengthen School Safety
October 23, 2014in Success Stories 0 Comments 0 Likes

Haystax Helps Florida Strengthen School Safety

Company News Haystax Selected to Present at IC Cloud Technology Expo in Langley, VA
September 11, 2014in Company News 0 Comments 2 Likes

Haystax Selected to Present at IC Cloud Technology Expo in Langley, VA

Policy & Practice Dynamic Trust – What is it and why should you care about it?
July 8, 2014in Policy & Practice 0 Comments 0 Likes

Dynamic Trust – What is it and why should you care about it?

Company News Haystax Technology to Co-Sponsor the 2014 National UASI Conference for 8th Year
May 19, 2014in Company News 0 Comments 0 Likes

Haystax Technology to Co-Sponsor the 2014 National UASI Conference for 8th Year

Company News Haystax Technology Assists States And Urban Areas Plan For 2014 Threat And Risk Assessment
May 14, 2014in Company News 0 Comments 0 Likes

Haystax Technology Assists States And Urban Areas Plan For 2014 Threat And Risk Assessment

Success Stories Haystax Technology Assists States and Urban Areas Plan for 2014 Threat and Risk Assessment
May 6, 2014in Success Stories 0 Comments 0 Likes

Haystax Technology Assists States and Urban Areas Plan for 2014 Threat and Risk Assessment

Company News Haystax Technology Chief Technology Officer Bryan Ware to Speak at the 12th Annual OffshoreAlert Conference
May 1, 2014in Company News 0 Comments 0 Likes

Haystax Technology Chief Technology Officer Bryan Ware to Speak at the 12th Annual OffshoreAlert Conference

Company News Haystax Endorses INSA’s Guidance on Improving Continuous Threat Monitoring and Evaluation Processes
March 20, 2014in Company News 0 Comments 0 Likes

Haystax Endorses INSA’s Guidance on Improving Continuous Threat Monitoring and Evaluation Processes

Company News Super Bowl Official Details Regional Coordinated Communications Effort
March 18, 2014in Company News 0 Comments 1 Likes

Super Bowl Official Details Regional Coordinated Communications Effort

Company News Indy uses emergency preparedness technology to respond to disasters
February 3, 2014in Company News 0 Comments 1 Likes

Indy uses emergency preparedness technology to respond to disasters

Company News Analytics pump up Super Bowl security game plan
January 29, 2014in Company News 0 Comments 1 Likes

Analytics pump up Super Bowl security game plan

The Latest at Haystax

Preventing School Violence: Challenges and Opportunities
Preventing School Violence: Challenges and Opportunities
2021 Insider Threat Lessons Learned
2021 Insider Threat Lessons Learned
Haystax Insider Threat Expert Contributes to INSA Paper
Haystax Insider Threat Expert Contributes to INSA Paper

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (66)
  • Product Updates (48)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.