Exabeam News Wrap-up – May 1, 2023
Here’s the latest collection of Exabeam news coverage, press releases, articles, and awards. Stay up to date with the Exabeam News Wrap-up and check out the Exabeam Newsroom for all things newsworthy.
In this article:
- 3CX Desktop App Supply Chain Attack Targets Millions
- Identity Management Day: Three Things MSSPs Need to Know
- Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
- APAC and Japan win big in Exabeam 2022 Partner Awards!
- Exabeam Receives 2022 TMCnet Workplace Excellence Award for Tech Diversity
- Leading From The C-Suite: Gorka Sadowski of Exabeam On Five Things You Need To Be A Highly Effective C-Suite Executive
- 16 Ways To Balance Your Goal-Setting Strategies In Business
3CX Desktop App Supply Chain Attack Targets Millions
Recently, 3CX, a voice and video conferencing software company, suffered a software supply chain attack that targeted its downstream customers. Exabeam CISO Tyler Farrar discusses the steps organizations should take to minimize the consequences of software supply chain attacks. Additionally, he highlights the crucial role of alert fatigue in the delayed detection of the 3CX attack.
Identity Management Day: Three Things MSSPs Need to Know
April 11 was Identity Management Day, providing MSSPs with an opportunity to educate prospects and customers about the importance of identity management. Matt Rider, VP of Sales Engineering, EMEA at Exabeam, explains how MSSPs can use UEBA to help their customers create a baseline of normal activity. By flagging deviations from this activity as potential security alerts, MSSPs can investigate and resolve any security issues before they lead to identity data breaches.
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
While security professionals remain confident in the face of modernizing adversaries despite rising breach numbers, the Exabeam State of SIEM survey has revealed that there is a mismatch between organizational security priorities and actual breaches. Although 97% of security professionals feel assured that they are well-equipped with the tools and processes needed to prevent and detect intrusions or breaches, other recent security industry reports indicate that 83% of organizations experienced more than one data breach in 2022. Tyler Farrar examines the survey results and dives deeper into the disconnect.
APAC and Japan win big in Exabeam 2022 Partner Awards!
Exabeam is proud to announce the winners of our third annual Exabeam Partner of the Year Awards! This award program recognizes outstanding Exabeam partners for 2022 who share the same passion for providing exceptional security and helping organizations detect the undetectable. These industry-leading VARs, MSSPs, system integrators, distributors, and global service partners provide a wide range of innovative sales, advisory and support services.
“We are very lucky to work with such a dynamic group of partners across the APJ region,” says Sean Abbott, Director of Channel and Alliances for APAC at Exabeam.
Exabeam Receives 2022 TMCnet Workplace Excellence Award for Tech Diversity
Exabeam is honored to receive the first annual 2022 Workplace Excellence Awards for Tech Diversity. The award recognizes the company’s dedication to fostering a work culture that prioritizes diversity as well as the emotional, physical, and financial wellness of employees. Certified a Most Loved Workplace, Exabeam promotes diversity in the hiring process by training leaders to find diverse candidates for every new role. Furthermore, we provide unconscious bias training for employees and actively support employee resource groups (ERGs), such as ExaGals, PRIDE, Vets, Black at Exabeam, and Pacific-Islander Waves, as an integral part of our culture.
Leading From The C-Suite: Gorka Sadowski of Exabeam On Five Things You Need To Be A Highly Effective C-Suite Executive
Gorka Sadowski, Chief Strategy Officer at Exabeam, shares his journey to the C-Suite and the essential skills required to be a highly effective executive. “Be strategic in your approach and thinking, but be ruthless in your execution. Do it with rigor and discipline too. This is much easier said than done,” he says.
16 Ways To Balance Your Goal-Setting Strategies In Business
Members of the Forbes Human Resources Council offer advice for setting goals that align with your company’s purpose and core values while remaining attainable during this year of uncertainty. Exabeam CHRO Gianna Driver highlights the significance of promoting an environment of learning, inclusiveness, and active listening to create a fun and healthy workplace.
Stay tuned for the next issue of the Exabeam News Wrap-up and catch up on previous editions!
Supply Chain Breaches and other OT/IoT Scenarios
Today with international sourcing, the mixture of proprietary and open-source code, and enormous variability in vendor practices, perfectly securing the enterprise supply chain borders upon the impossible.
The list of supply chain attacks is long and infamous, and, of course, this applies to hardware as well — peripherals, networking equipment, and IoT devices. But in the end, the commonality to all IoT devices and supply chain attacks is the compromise of credentials and authentication, followed by abuses of network privileges in proliferation and spread.
The infamous SolarWinds supply chain cyberattack in December 2020 was devastating not only because of its reach — extending to at least nine federal agencies, critical infrastructure entities, and more than 100 private sector organizations. Its sophisticated strategy made it virtually invisible unless you had tools to uncover user behavior.
In this on-demand webinar, you’ll learn:
- What steps can CISOs, and IT security teams take to mitigate risk from supply chain attacks
- How SIEM and XDR solutions can detect attacks that have slipped past your perimeter defenses
- How third-party credentials are being used, and how user and entity behavior analytics (UEBA) can help detect unauthorized access
Safeguarding Banks With Security Updates, Patching, and Pen Testing
8 Critical Considerations For Defending Against Insider Threats
Subscribe today and we'll send our latest blog posts right to your inbox, so you can stay ahead of the cybercriminals and defend your organization.
See How New-Scale SIEM™ Works
New-Scale SIEM lets you:
• Ingest and monitor data at cloud-scale
• Baseline normal behavior
• Automatically score and profile user activity
• View pre-built incident timelines
• Use playbooks to make the next right decision
Request a demo of the industry’s most powerful platform for threat detection, investigation, and response (TDIR).
Get a demo today!