
Keeping Up with Insider Risk Management in an Ever-Changing Landscape
When you hire and train a new employee, you’re putting a certain amount of trust in that person.[…]
RSA, a form of public-key cryptography widely used to secure communication between multiple parties was discovered in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman. But they weren’t the only ones working on public-key encryption. Two Stanford technologists Whitfield Diffie and Martin E. Hellman introduced their own public-key cryptosystem just ahead of the RSA algorithm.
When most organizations look for automation solutions, they immediately turn to a security orchestration and automated response (SOAR) solution, which uses application programming interfaces (APIs) to automate response and remediation through playbooks. Implementing a SOAR solution is a huge undertaking that requires strategic planning and time to execute. The good news is there are other ways to quickly reap the benefits of automation before embarking on a total SOAR solution.
The Security Management Excellence Awards recognize Exabeam customers that distinguish themselves through excellence and innovation in security management across the following five categories: SIEM Modernizer, Cloud Navigator, Insider Threat Decoder, SOC Automator and IoT Security Pioneer.