[12 Jun 2013 | 0 Comments]

I know you have a plan for intrusion, malware, spyware, and digital exfiltration scenarios, but what are you doing about the malicious insider? What exactly is your game plan? Is it to hire only honest people then pretend everyone with a badge is family and would never betray your trust? Heck, you probably don’t even trust members of your real family that much, let alone your work family. Or maybe your plan is to use whitelisting technology and divide your organization into thousands of security zones, adding bureaucracy that makes every job 10x harder than it should be? We all know the elephant in the room is the malicious insider, something you can never fully prevent – but with the magic of Analytics it can be detected in time to react. [More]

Sphere of Influence »

[20 May 2013 | 0 Comments]

“The challenge is knowing what to kill and what to keep, what’s essential and what isn’t. People have a tendency to want more even when it it’s not necessarily good for them“. Are you adding, adding, adding to your products and calling it innovation? Do you have any process for considering the wholeness and strong-center of a product as a way of filtering the features that go into it? [More]


[18 Apr 2013 | 0 Comments]

I just got back from SXSW 2013. Okay, maybe it was a few weeks ago, but I definitely want to pass along some of what I learned there. This blog discusses Sid Meier's insights on incorporating unconventional psychology. [More]


[24 Mar 2013 | 0 Comments]

What happens when two well-designed features, each with strong individual merit, don’t pleasantly coexist in the same product or system? The problem isn’t with either feature; the problem is the mix of features, or the way in which they are mixed. We occasionally see examples of this in games, but it’s extremely common in mission and enterprise software. [More]


[14 Dec 2012 | 0 Comments]

We actually do a lot of hard-science R&D at Sphere of Influence. Among our specialties is developing the most sophisticated behavioral profiling technologies in the world. Our algorithms isolate anomalies in all kinds of noisy data, finding that needle in a stack of needles, and doing useful stuff too. One of the coolest things we’ve developed lately is our insider cyber-threat detection technology that detects unusual behaviors on private networks. [More]