How Asset Clustering Provides Improved Alert Quality – A Machine Learning Application
Learn about a machine learning use case that clusters network assets (or devices) into groups to improve the alert quality from peer-based analysis.
2019 promises to be as difficult to predict as every year, so Exabeam spoke to Professor Alan Woodward from the University of Surrey to get his thoughts on the cyber security landscape for the year ahead.
Exabeam’s Cybersecurity History Review: Read about Operation Aurora and the series of cyberattacks in 2010 conducted by the Elderwood Group based in Beijing, China, with ties to the People’s Liberation Army.
2018 was a memorable year for cybersecurity. Millions of people were impacted as we saw more companies hit by megabreaches—from a major hotel chain to a social media platform used by billions. Here are our top 10 blog posts that had the biggest readership and were the most noteworthy.
Read about the cloud security strategies of a global engineering firm that employs tens of thousands of people. Reliable data security is not only critical to their business, it is also a primary component of the solutions they provide to their customers. Specifically, it’s essential that this firm protects their network of virtual machines (VMs) in their private cloud.
Security operation center (SOC) managers know their security analysts spend an enormous amount of time sifting through information and alerts across a variety of non-integrated tools, trying to find the data they need to investigate potential threats. Read how Exabeam Threat Intelligence Service directly integrates with your current SIEM for the most up-to-date threat intelligence so your analysts can identify and mitigate new and emerging attacks at no added cost or impact to the customer.
A global clothing manufacturer embraces cloud technology, and is using cloud services for software development and source code version control. It considers its source code to be intellectual property (IP) worthy of protection. Read how they prevent their source code from falling into the wrong hands and how they stop malware and ransomware.