Ryan Stolte

Opinions expressed by ICN authors are their own.

Ryan Stolte founded Bay Dynamics in 2001, and he has since grown the company into a leading IT solution provider with a diverse portfolio of products and services. His breadth of experience assisting organizations optimize their IT and security processes, combined with his deep knowledge of analytics has provided the foundation for the company’s solution Risk Fabric, which helps companies measure, communicate and reduce cyber risk.

Ryan has spent more than 20 years of his career solving big data problems with analytics. Starting in the early days of the Web, his first user behavior analytics challenges were to find innovative ways to recommend products to end users and drive sales on e-commerce sites. With the proliferation of the connected enterprise, his attention turned to new analytics challenges with internal IT, cloud, and cybersecurity initiatives.

With two decades of experience in user behavior analytics, a portfolio of analytics patents, and an unparalleled leadership team, Ryan is focused on finding innovative ways to provide smart cybersecurity solutions for the enterprise.

The opinions expressed in this blog are those of Ryan Stolte and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Machine learning: It’s all about the use cases [baby]!

The missing act for user and entity behavior analytics

The missing act for user and entity behavior analytics

What’s the real definition of winning? Is it when cyber criminals get inside or when they move sensitive data out? According to Symantec’s SVP of Information Protection, Nico Popp, it’s the latter, making data a vital Indicator of...

Short on security analysts? AI can help

Short on security analysts? AI can help

A new study shows just nine percent of millennials are interested in cyber security careers. That means the shortage of security analysts will increase. With the onslaught of threats, and mountain of data coming into organizations...

How can SOC analysts hunt more efficiently? By not hunting

How can SOC analysts hunt more efficiently? By not hunting

To win the battle against today’s sophisticated cyber threats, security analysts must disrupt a kill chain or lateral movement attack early in the process. Achieving success requires pinpointing the real threat amidst a never-ending...

Traditional cyber solutions are the answer when used in the right way

Traditional cyber solutions are the answer when used in the right way

When it comes to cybersecurity, every investment counts.

Detecting malicious insiders: a new use case for data loss prevention

Detecting malicious insiders: a new use case for data loss prevention

A discussion with Symantec’s Nico Popp about how DLP has evolved over the years.

7 insider attacks behavior analytics detects

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

Of clouds and compliance: DLP + UEBA are back in the spotlight

Of clouds and compliance: DLP + UEBA are back in the spotlight

Like many technologies before them that have needed to ripen on the vine for many years before accomplishing what they initially set out to do, DLP and user and entity behavior analytics now find themselves on the cusp of doing just...

Building an insider threat program from the inside-out, not outside-in

Building an insider threat program from the inside-out, not outside-in

Including the 10 questions you should ask when building an insider threat program.

From buzz to the battleground, AI is everywhere

From buzz to the battleground, AI is everywhere

An open letter to artificial intelligence.

Multi-factor authentication needs a little Goldilocks

Multi-factor authentication needs a little Goldilocks

Companies cannot apply multi-factor authentication to everything a user does.

Load More