Ryan Stolte

Opinions expressed by ICN authors are their own.

Ryan Stolte founded Bay Dynamics in 2001, and he has since grown the company into a leading IT solution provider with a diverse portfolio of products and services. His breadth of experience assisting organizations optimize their IT and security processes, combined with his deep knowledge of analytics has provided the foundation for the company’s solution Risk Fabric, which helps companies measure, communicate and reduce cyber risk.

Ryan has spent more than 20 years of his career solving big data problems with analytics. Starting in the early days of the Web, his first user behavior analytics challenges were to find innovative ways to recommend products to end users and drive sales on e-commerce sites. With the proliferation of the connected enterprise, his attention turned to new analytics challenges with internal IT, cloud, and cybersecurity initiatives.

With two decades of experience in user behavior analytics, a portfolio of analytics patents, and an unparalleled leadership team, Ryan is focused on finding innovative ways to provide smart cybersecurity solutions for the enterprise.

The opinions expressed in this blog are those of Ryan Stolte and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

How can SOC analysts hunt more efficiently? By not hunting

Traditional cyber solutions are the answer when used in the right way

Traditional cyber solutions are the answer when used in the right way

When it comes to cybersecurity, every investment counts.

Detecting malicious insiders: a new use case for data loss prevention

Detecting malicious insiders: a new use case for data loss prevention

A discussion with Symantec’s Nico Popp about how DLP has evolved over the years.

7 insider attacks behavior analytics detects

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

Of clouds and compliance: DLP + UEBA are back in the spotlight

Of clouds and compliance: DLP + UEBA are back in the spotlight

Like many technologies before them that have needed to ripen on the vine for many years before accomplishing what they initially set out to do, DLP and user and entity behavior analytics now find themselves on the cusp of doing just...

Building an insider threat program from the inside-out, not outside-in

Building an insider threat program from the inside-out, not outside-in

Including the 10 questions you should ask when building an insider threat program.

From buzz to the battleground, AI is everywhere

From buzz to the battleground, AI is everywhere

An open letter to artificial intelligence.

Multi-factor authentication needs a little Goldilocks

Multi-factor authentication needs a little Goldilocks

Companies cannot apply multi-factor authentication to everything a user does.

Load More