Skip to main content

LIFE AT EXABEAM

The Importance of User Behavior Intelligence [WHITE PAPER]

Writing a white paper means the company has a strong grasp of a pervasive problem. In this case, it addresses finding cyberattackers using stolen credentials to access private data. According to the Ponemon Institute, it costs companies an average of $201 per record lost in a data breach. In 2014, the total number of records compromised was larger than the US population, meaning the cost to businesses would be more than half a billion dollars. And this[…]

Read more

Topics: LIFE AT EXABEAM, SECURITY

Anthem's 80 million record data breach: interesting insights...

Our first large scale data breach of 2015 and its cause, according to Anthem President and CEO Joseph Swedish, is, “These attackers gained unauthorized access to Anthem’s IT systems…”. Just as with all of the largest data breaches that happened in 2014, this one involved some form of unauthorized access, whether it was through direct access or remotely controlled malware. This breach continues a three-year trend. Breaches in the medical/healthcare industry topped the ITRC 2014 Breach List, comprising 42.5 percent.[…]

Read more

Topics: LIFE AT EXABEAM, SECURITY

Fixing the stolen credentials problem means fixing "us" first [VIDEO]

Behind every big data breach headline there’s an attacker that has social engineered valid credentials out of someone. People often use the same password for their personal email as they do for their workplace and the various e-commerce sites they log into. If businesses expect to prevent attackers from leveraging valid credentials, they must first start with people taking more precautions with their passwords. I’m sure many of you have seen this, but no recent[…]

Read more

Topics: LIFE AT EXABEAM, SECURITY

Finding Cybercriminals with User Behavior Intelligence

On January 18, 2015, WJLA Channel 7’s Morris Jones, host of Washington DC’s Government Matters, interviewed Mark Seward, vice president of marketing at Exabeam, about attackers using valid credentials to infiltrate businesses and government agencies, and how to find them using user behavior intelligence and Stateful User Tracking™.  Today, attackers use valid credentials to access systems and navigate their way to valuable data, bypassing current security detections. User behavior intelligence supports a strategy of applying behavioral[…]

Read more

Topics: LIFE AT EXABEAM, SECURITY

The End of SIEM as We Know It, or Why I joined Exabeam

For the better part of the last decade, I’ve been fascinated by the promise of security information and event management (SIEM) systems. I joined one of the most advanced SIEM vendors as a security engineer, and worked tirelessly to make this passion a reality. The ability to monitor all security activity from a central location was a complete game-changer in my mind, and adding a querying engine that would ask any question of the data[…]

Read more

Topics: LIFE AT EXABEAM, SECURITY

Welcome to Exabeam!

Welcome to the first Exabeam blog post: You may be asking, “Why is this a big deal? Most websites have a blog section.” Hold it, not so fast; ours didn’t. But rather than create another generic cyber-security blog, we wanted to give readers the opportunity to open a channel of communication with a bunch of very smart people from the SIEM, log management, and cybersecurity professions. We understand the serious problems businesses face from attackers who[…]

Read more

Topics: CUSTOMERS, LIFE AT EXABEAM, SECURITY
2017