Exabeam

New SOC Report: Staffing Patterns Among Todayā€™s SOCs

A security operations center (SOC) is an organizationā€™s first line of defense against outside adversaries. Businessesā€™ overall cybersecurity programs should be judged on the effectiveness of their SOCs – whether in-house or outsourced. One of the most important measures to see if a SOC is successful is to look into hiring and staffing practices. Exabeamā€™s […]

Government Cybersecurity is a Global Problem: Hereā€™s How Agencies Can Address It

By Abel Morales, security engineer and CISSP, Exabeam While cybersecurity ahead of the 2020 Presidential election is top of mind in the United States, Q1 2020 alone has shed light on the fact that government security issues are of global concern, not just national. This year has already seen a steep rise in leaked government […]

Examining Potential Election Vulnerabilities – Are They Avoidable?

By Tim Matthews, Chief Marketing Officer at Exabeam In the U.S and global communities, election security is a large concern because so many aspects of it can be insecure and open to attacks that may shift public opinion or be used for personal gain. Not only does the complexity of the U.S. government raise concerns […]

Security pros hampered by burnout, lack of diversity – how do we fix this?

The cybersecurity profession is in a somewhat precarious state. Not only are cyber pros faced with increasing threats from insiders, but threats from external adversaries also continue to rise and are becoming more sophisticated. At the same time, companies are challenged by a crippling cybersecurity skills shortage:Ā ESG/ISSG recently found that a whopping 74% of organizations […]

Cloud Security company SkyFormation acquired by Exabeam

California based Security Management Company Exabeam has made it official that it is going to acquire Israel based Cloud Security startup SkyFormation for an undisclosed amount. Exabeam plans to integrate the technology of SkyFormation into its Security Information and Event Management (SIEM) products to supplement its market growth. Although cloud computing technology has dominated in […]

A Brief History of Cybersecurity

By Tim Matthews As I walked around the RSA Conference this year, one thing I realized I was missing was the theme. For years, RSA would tie the conference to an important event or development from the centuries of security, from the conqueror Caesar to the Navajo code talkers in WWII. And itā€™s not just […]

5 Best Practices for Creating an Effective Computer Security Incident Response Team (CSIRT)

By: Stephen Moore,Ā ExabeamĀ Chief Security Strategist In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. Unlike a security operations center (SOC) ā€”a dedicated group with the tools to defend networks, servers, and other IT infrastructureā€”a CSIRT is a cross-functional team […]

6 Essential Steps for an Effective Incident Response Plan

By: Luke Voigt, Sr. Security Engineer During a cybersecurity incident, security teams will face many unknowns and a frenzy of activity. In such a hectic environment, they may fail to follow proper incident response procedures to effectively limit the damage. This is important because a security incident can be a high-pressure situation, and your IR […]

Share this page