Skip to content

Exabeam Introduces First Connected System for AI Agent Behavior Analytics and AI Security Posture Insight — Read More

Exabeam News Wrap-up – July 25, 2022

  • Aug 01, 2022
  • Heidi Willbanks
  • 2 minutes to read

Table of Contents

    We’ll be regularly bringing you a summary of Exabeam’s key topics and headlines. Stay up to date with the Exabeam News Wrap-up!

    Flying Blind in Security Operations

    This week in Dark Reading, Exabeam Chief Strategy Officer Gorka Sadowski discussed how organizations can proactively prevent future threats to mitigate the lasting consequences of data breaches and fix security blind spots. He highlighted the importance of behavioral analytics in distinguishing normal versus abnormal behavior.

    “There is not a single vendor on the planet right now that can provide a one-stop shop of world-class technology to prevent and stop breaches. One doesn’t exist,” asserts Gorka. Organizations need to be able to choose best-in-class technologies that work well and integrate together no matter what company built them.

    Roblox Breached Via Phishing for Extortion

    News broke this week that gaming platform Roblox was breached via a phishing/social engineering attack that led to a cybercriminal stealing internal documents and leaking them online for extortion. Exabeam Director of Product Marketing Jeannie Warner provided commentary in Disaster Recovery Journal.

    “Many network attack vectors start with a link to a phishing URL,” explains Jeannie. “A carefully crafted email containing the malicious link is sent to an unsuspecting employee. As soon as it’s clicked, malware is loaded and the cycle of information loss and damage begins. Any company that houses sensitive data should aim to nip this problem early on by identifying and alerting these malicious links.”

    External threats such as ransomware, phishing, and malware attacks are a daily occurrence for every organization. While defense against these attacks is improving, their quickly evolving nature means prevention is never guaranteed. Security operations teams must be prepared to respond to an active attack at any time.

    Defending against external threats is more than just choosing the right security solutions. It’s also creating a security program that puts people, processes, and technology together. 
    Download the checklist and use it as a guide when defending and responding to external attacks.

    Heidi Willbanks

    Heidi Willbanks

    Senior Product Marketing Manager, Content | Exabeam | Heidi Willbanks is the Senior Product Marketing Manager, Content at Exabeam. She manages content strategy and production for product marketing and supports strategic partners, sales and channel enablement, and competitive content, leveraging her product marketing certification, content expertise, and industry knowledge. She has 19 years of experience in content marketing, with nearly a decade in the cybersecurity field. Heidi received a BA in Journalism with a minor in Graphic Design from Cal Poly Humboldt and was awarded Outstanding Graduating Senior in Public Relations Emphasis. She enjoys reading, writing, gardening, hiking, yoga, music, and art.

    More posts by Heidi Willbanks

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Guide

      Insider Threats: When the Attacker Has Valid Credentials

    • Podcast

      Safety Third: Why Security Shouldn’t Be Your Top Priority

    • White Paper

      A Strategic Framework for Selecting Your Cloud-Native SIEM

    • Guide

      Nine Questions Every CIO Must Ask About Their SIEM

    • Blog

      Decoding the 2025 MITRE ATT&CK® Evals: A Call for Clarity and a Guide for Analysts

    • Blog

      Model Context Protocol Server: The Universal Remote for AI Agents

    • Show More