The Three Elements of Incident Response: Plan, Team, and Tools
Learn how an incident response plan is used to detect and respond to incidents before they become a major setback.
Read about the first computer virus that preceded computer networks, called the Creeper. German mathematician John von Neumann (famous for major contributions to economics, such as game theory) first theorized the concept in the late 1940s. He envisioned a computer virus as an automatically self-replicating entity. But it was another 30 years before someone created one.
Read Exabeam’s latest research report about the hidden world of cryptocurrency mining, called “shadow mining” and how malicious insiders can abuse their IT rights to mine cryptocurrency within their own organization. Learn why it’s a security threat and what organizations can do to protect themselves.
Read about SIEM-as-a-Service and how Exabeam SaaS Cloud reduces SIEM deployment, maintenance, and operational overhead by delivering the Exabeam Security Management Platform as a cloud-based service. SaaS Cloud ingests and behaviorally analyzes data from any cloud or on-prem data source, empowering enterprises to detect, investigate, and respond to cyber attacks more efficiently.
Read about the new genus of malware that breaks the rules of traditional detection and defense methods. Called fileless malware, it’s unlike other breeds of malware that require the installation of software on a victim’s machine. According to the Ponemon Institute, it accounts for 35% of all cyberattacks in 2018.
It’s been nine months since May 25, 2018 when the General Data Protection Regulation (GDPR) went into effect in the EU. During this short period of time much has happened, including megabreaches that continue to occur throughout the world. Read about the latest InfoSec strategies and developments.
Cybersecurity History: Read about how Netscape began development of the SSL protocol. In 1994, Netscape had SSL version 1.0 ready, but it never made a public debut as it had several significant security flaws, which eventually led to the evolution of HTTPS based on SSL 2.0 and its successor TLS.
Building a modern security operations center (SOC) is much more than assembling the latest equipment and then hiring a team of analysts. Read about what it takes to stay on top of threats, be current with emerging technology and trends, and hire and keep the right talent.