Bryan Ware

Opinions expressed by ICN authors are their own.

Bryan Ware is CEO of Haystax Technology. He is a pioneer in the development and application of analytic methods and tools for enterprise risk management, high consequence/low probability events, critical infrastructure protection and risk-based resource allocation. Bryan was previously the co-founder of Digital Sandbox, Inc., a provider of security risk analytics and intelligence fusion products that was acquired by Haystax in 2013.

The opinions expressed in this blog are those of Bryan Ware and do not necessarily represent those of IDG Communications Inc. or its parent, subsidiary or affiliated companies.

Why we need more shades of gray

Knowing when a trusted insider becomes a threat

Knowing when a trusted insider becomes a threat

The time has come to pay serious attention to new ways of identifying and preventing such insider threats early on.

3 security analytics approaches that don’t work (but could) — Part 2

3 security analytics approaches that don’t work (but could) — Part 2

Security analytics approaches using the strengths of Bayesian networks, machine learning and rules-based systems can be vital if they are thoughtfully built, combined and applied.

3 security analytics approaches that don’t work (but could) — Part 1

3 security analytics approaches that don’t work (but could) — Part 1

Bayesian networks, machine learning and rules-based systems individually don't work well. They don’t produce good results, don’t scale or are too hard to work with.

Building an insider threat program that works — Part 2

Building an insider threat program that works — Part 2

A world-class insider threat program must have three core characteristics: prevent insider threat events, adapt to threats and be able to scale.

Building an insider threat program that works – Part 1

Building an insider threat program that works – Part 1

Lessons learned from the front lines of insider threat risk management.

Why cyber hygiene isn't enough

Why cyber hygiene isn't enough

Organizations need to practice regular cyber hygiene for healthy outcomes. But they must also take steps to mitigate cyber risk—the most serious threats to our security.

Load More