Empowering Deakin University’s Curious Minds While Protecting Against the Cyberthreats They Often Invite
Education is the mission of every university, but paradoxically, the curiosity that stimulates learning can have other consequences[…]
Cybercrimes are continually evolving. Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.
We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.
More organizations are automating security in their development processes. Security automation is a vital tool that streamlines processes and integrates secure design early in the software development life cycle.
RSA, a form of public-key cryptography widely used to secure communication between multiple parties was discovered in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman. But they weren’t the only ones working on public-key encryption. Two Stanford technologists Whitfield Diffie and Martin E. Hellman introduced their own public-key cryptosystem just ahead of the RSA algorithm.
UEBA uses machine learning and data science to gain an understanding of how users (humans) within an environment typically behave, then find risky and anomalous activity that deviates from their normal behavior that may be indicative of a threat.
The data breach at Capital One that exploited a vulnerability in the cloud reported a few weeks ago was one of the largest-ever bank data thefts. We look at how it maps to the MITRE ATT&CK framework and how it could have been detected.
During an incident investigation security analysts assess different indicators of compromise (IoCs) or the tactics, techniques, and procedures (TTPs) of an attack to determine the context in which an alert is firing. We look at how you can find critical information that will help gain a true understanding of the alert or incident.
When most organizations look for automation solutions, they immediately turn to a security orchestration and automated response (SOAR) solution, which uses application programming interfaces (APIs) to automate response and remediation through playbooks. Implementing a SOAR solution is a huge undertaking that requires strategic planning and time to execute. The good news is there are other ways to quickly reap the benefits of automation before embarking on a total SOAR solution.