Information Security

Information Security

Practices and technology used in protecting against the unlawful use of information, particularly electronic data, or the measures taken to accomplish this.

InfoSec leaders need to stay up-to-date on the latest in information security practices and technology to stay ahead of attackers.

Cybercrimes are continually evolving. Make the Exabeam website and blog a regular source for your information security knowledge.

Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.

Or get our RSS feed

Outcomes Above All: Helping Security Teams Outsmart the Odds

Author: Sherry Lowe, Chief Marketing Officer The world’s gotten complicated. Business, people, and data are everywhere. Attack surfaces are expanding daily, and insider threats remain a problem that demands constant attention. On top of everything, security teams are faced with billions of alerts and countless false positives that distract them from responding to real threats.… Read more »


Information Security Articles
Outcomes Above All: Helping Security Teams Outsmart the Odds

Author: Sherry Lowe, Chief Marketing Officer The world’s g...

Ethical Hacking: Why It’s Important & What Makes a Good Hacker

What Is ethical hacking? Ethical hacking is a practice where...

How Lineas, Europe’s Largest Private Rail Freight Operator Found the Right Cybersecurity Tool

Vital infrastructure has become an area of concern for cyber...

Our Journey to Diversity and Inclusion in the Workplace

Exabeam has always strived for diversity and inclusion (D&am...



Articles
Advanced Analytics Use Case: Detecting Compromised Credentials 

Stolen credentials have been a persistent problem, and organ...

Outcomes Above All: Helping Security Teams Outsmart the Odds

Author: Sherry Lowe, Chief Marketing Officer The world’s g...

Ethical Hacking: Why It’s Important & What Makes a Good Hacker

What Is ethical hacking? Ethical hacking is a practice where...

Understanding Cloud DLP: Key Features and Best Practices

Cloud DLP enables organizations to protect data residing in ...

How Lineas, Europe’s Largest Private Rail Freight Operator Found the Right Cybersecurity Tool

Vital infrastructure has become an area of concern for cyber...

What Is an Insider Threat? Understand the Problem and Discover 4 Defensive Strategies

Learn what an insider threat is and how they can hurt an org...

Get the Latest on Information Security

We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.

Or get our RSS feed