You searched for artificial - Page 3 of 9 - Exabeam

Exabeam SIEM: Bridging the Gaps for Advanced SOC Functionality

In 2023, adversaries breach systems within just 84 minutes, down from 98 minutes in 2022. In this dynamic, fast-paced world of emerging and evolving cyberthreats, security information and event management (SIEM) tools are indispensable for protecting organizations’ valuable data. However, escalating log volumes, complex multi-vendor security operations center (SOC) infrastructure, and the perpetual challenge of alert fatigue create an uphill battle for security operations teams responsible for maintaining effective cyberdefense. This blog post explores common[...]

UEBA Tools: Key Capabilities and 7 Tools You Should Know

UEBA Explainers: What Is UEBA (User and Entity Behavior Analytics)? What Is UEBA and Why It Should Be an Essential Part of Your Incident Response > UEBA Tools: Key Capabilities & 7 Tools You Should Know UEBA Tools: Key Capabilities and 7 Tools You Should Know What Are UEBA (User and Entity Behavior Analytics) Tools?  UEBA tools are software systems that use machine learning and statistical methodologies to identify anomalous behavior or instances within a[...]

The Promises and Perils of AI in Cybersecurity

AI and security operations: how to leverage AI while simultaneously defending and protecting your organization against it. While artificial intelligence (AI) is certainly not new, it re-burst onto the scene this year thanks to the democratizing effect of generative AI powered by large language models (LLMs). Enterprise innovators like ​Google, with Google Cloud, have made AI engineering experimentation incredibly easy with Bard and Vertex AI respectively, and OpenAI introduced the public at large to the[...]

From “WarGames” to Wall Street: Frank Vesce’s Cybersecurity Journey

In episode 98 of The New CISO Podcast, host Steve Moore welcomes Frank Vesce, CISO at Allvue Systems, for a discussion on the technical and human facets of security. Read on to learn about Frank’s professional journey, his unique approach to interviewing, and his motivation to mentor. In this article: A cybersecurity expert’s origin story Hiring tactics: beyond the resume Understanding complaint dynamics in cybersecurity From finance to Coast Guard tabletop exercises What’s in a[...]

Applying Data Science to User and Entity Behavior Analytics (UEBA)

Discover how data science, including machine learning (ML) and artificial intelligence (AI) enhances user and entity behavior analytics (UEBA) to effectively mitigate cyberthreats. In this white paper, gain insights into applying ML within UEBA using real-world examples from Exabeam products. Learn how analytics, ML, and security research combine to create a powerful cybersecurity solution By reading this paper, you’ll learn: The role of data analytics in UEBA and its importance in cybersecurity Strategies for building[...]

A CISO’s Guide to the AI Opportunity in Security Operations

Are you aware of the benefits and risks of using artificial intelligence (AI) in security operations? As business leaders and decision makers across various sectors embrace the potential of AI, they are confronted with critical questions, such as: What are the potential dangers? Could AI be used against us? Is our organization truly prepared? While these questions are far from baseless, given the transformative power of AI, it’s also essential to recognize that security operations[...]

A CISO’s Guide to the AI Opportunity in Security Operations

As a CISO, are you prepared for the benefits and risk of leveraging AI in security operations? As business leaders and decision makers across various sectors embrace the potential of artificial intelligence (AI), they are confronted with critical questions: What are the potential dangers? Could AI be used against us? Do we have the right policies in place? How concerned should we be? Is our organization truly prepared? These questions are far from baseless, given[...]

AI SIEM: How SIEM with AI/ML is Revolutionizing the SOC

SIEM Explainers: SIEM Overview SIEM Architecture: Technology, Process and Data The Significance and Role of Firewall Logs Security Big Data Analytics: Past, Present and Future SIEM Log Management: Log Management in the Future SOC SIEM Implementation in 4 Steps Managed SIEM: Key Features, Benefits, and How to Choose a Provider SIEM Alerts: Understanding Security Information and Event Alerts Exploring SIEM Examples: Modern Capabilities and Top Solutions for Cybersecurity Five SIEM Benefits Unveiled: Strengthening Security and[...]

Exabeam Partners with Google Cloud on New Generative AI Features For Improving Security Operations

Building on a mature portfolio of machine-learning (ML) and AI capabilities, Exabeam New-Scale SIEM products add new generative AI experiences using Google Cloud technologies Foster City, Calif., August 30, 2023 - Exabeam, a global cybersecurity leader that created New-Scale SIEM™ for advancing security operations, and a 2023 Google Cloud Technology Partner of the Year for Security - Analytics, today announced it is expanding its partnership with Google Cloud in the development of generative artificial intelligence[...]

Threat Detection and Response: Technologies and Best Practices

New-Scale SIEM™ Explainers: 10 Must-Have Features to be a Modern SIEM Combating Cyber Attacks With SOAR Cloud SIEM: Features, Capabilities, and Advantages > Threat Detection and Response: Technologies and Best Practices Threat Detection and Response: Technologies and Best Practices What Is Threat Detection, Investigation, and Response?  Threat detection and response, often abbreviated as TDR, refers to a collection of cybersecurity processes and solutions aimed at identifying, analyzing, and responding to security threats. If you add the[...]

101 results found for artificial.
Showing results 25 - 36