About Exabeam
Cybercrimes are continually evolving. Make the Exabeam website and blog a regular source for your information security knowledge.
Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.
Or get our RSS feedAdvanced Analytics Use Case: Detecting Compromised Credentials
Stolen credentials have been a persistent problem, and organizations have yet to effectively solve that problem. Every week, we hear about credential-stuffing attacks where a threat actor successfully steals credentials, logs in to the environment and moves laterally to gain higher-level access. All activities have a single focus: to access private data or high-value assets.… Read more »




Detecting Lateral Movement and Credential Switching: Human vs. Machine
January 16, 2020
Paris Stone


Recreating an Incident Timeline–a Manual vs. Automated Process, Part 2
November 7, 2019
Erik Randall

Recreating an Incident Timeline–a Manual vs. Automated Process, Part 1
October 31, 2019
Erik Randall
Get the Latest on Information Security
We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.
Or get our RSS feed