2018 was a memorable year for cybersecurity. Millions of people were impacted as we saw more companies hit by megabreaches—from a major hotel chain to a social media platform used by billions. And it was certainly a topic in the news, as organizations strategized about how to improve their security and governments considered regulations like GDPR for greater data privacy protections.

Reviewing all of Exabeam’s coverage, these are our top 10 blog posts that had the biggest readership and were the most noteworthy.

  1.  How UEBA Overcomes 5 Hurdles to Achieving Effective Security and Incident Response
     Orion Cassetto
    Cybersecurity pros know that the threat volume has increased and its severity is getting worse. Read how, by investing in new technology such as user and entity behavior analytics (UEBA), organizations can achieve better network security and incident response.
  2.  

  3. The Complete Guide to CSIRT: How to Build an Incident Response Team
    Tim Matthews
    A computer security incident response team (CSIRT) will mitigate the impact of security threats, and more often is becoming a necessity. Learn what it takes to build a CSIRT dedicated to incident response.
  4.  

  5.  5 Things to Know About Exabeam Data Lake
    Orion Cassetto
    A security data lake lets organizations collect and store unlimited amounts of log data for threat detection and compliance use cases. Learn about the most important things to know on the Exabeam Data Lake.
  6.  

  7. 5 Best Practices for Your Incident Response Plan
    Luke Voigt
    Too often security incidents happen without warning. Read about how having a well-conceived IR plan enables security teams to quickly triage an incident, while pointing analysts in the right direction.
  8.  

  9. SIEM Threat Detection – Rules or Models?
    Pramod Borkar
    Next-gen SIEM technology offers security professionals some of the most effective threat detection capabilities for dealing with modern security challenges. Read about the advantages of using models versus correlation rules.
  10.  

  11. Incident Response Plan: 6 Essential Steps for Responding to a Security Incident
    Luke Voigt
    Security teams face many unknowns and a frenzy of activity during a cybersecurity incident. Following these incident response steps can limit the damage.
  12.  

  13. Security Data Lakes: Comparing the “Do It Yourself” Deployments Versus Commercial Solutions
    Pramod Borkar

    Looking at a DIY security data lake versus a commercial solution? Here are the key considerations.
  14.  

  15.  Introducing Behavioral Analysis for Devices – Exabeam Entity Analytics
    Tim Matthews
    According to Gartner, we’re on track for 4 billion internet of things (IoT) devices by 2020. Whether it’s a security camera or wind turbine, Exabeam Entity Analytics analyzes the behavior of these machines and devices for greater cybersecurity.
  16.  

  17. Understanding the Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity
    Derek Lin
    Artificial Intelligence (AI) was in the news a lot in 2018. Beyond the hype, learn about the applications of AI, machine learning, and deep learning in the world of cybersecurity.
  18.  

  19. 2018 State of the SOC Report
    Maritza Marie Dubec
    Exabeam’s survey report dove into the mindset of those in the cybersecurity trenches, as well as the managers and CISOs who lead them. Read about the report’s key insights on security operations and cybersecurity leadership.

 

For more cybersecurity news, subscribe to the Exabeam blog and follow us on Twitter and LinkedIn.

Content Lead

More like this

If you’d like to see more content like this, subscribe to the Exabeam Blog

Subscribe

Exabeam provides security intelligence and management solutions to help organizations of any size protect their most valuable information.