Tips and Tricks Archives - Exabeam

Tips and Tricks

Cybercrimes are continually evolving. Make the Exabeam website and blog a regular source for your information security knowledge.

Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.

Or get our RSS feed

Top 10 Data Lake Query Tricks

With Exabeam Data Lake’s query feature, in just a few seconds, you can enter a search term and get all the information you need about security risks affecting your network. Here are 10 query tips that can help you use Data Lake to its fullest.


Tips and Tricks Articles
How to Configure Windows Event Forwarding (WEF) using Supercharger

In 2008 Microsoft released Windows Event Forwarding (WEF) fo...

Apache Nifi: Send From MySQL to Syslog

Our prior post in this series, Ingest Syslog Data Via Apache...

How to Self-study to Become a Software Engineer, Part 2

In my previous article I talked about getting strong fundame...

How to Ingest Files and NetFlow with Apache NiFi

Most organizations have data flows enabled at some level. Th...

How to Self-study to Become a Software Engineer, Part 1

I graduated college with a degree in social welfare, and a l...



Articles
Advanced Analytics Use Case: Detecting Compromised Credentials 

Stolen credentials have been a persistent problem, and organ...

Outcomes Above All: Helping Security Teams Outsmart the Odds

Author: Sherry Lowe, Chief Marketing Officer The world’s g...

Ethical Hacking: Why It’s Important & What Makes a Good Hacker

What Is ethical hacking? Ethical hacking is a practice where...

Understanding Cloud DLP: Key Features and Best Practices

Cloud DLP enables organizations to protect data residing in ...

How Lineas, Europe’s Largest Private Rail Freight Operator Found the Right Cybersecurity Tool

Vital infrastructure has become an area of concern for cyber...

What Is an Insider Threat? Understand the Problem and Discover 4 Defensive Strategies

Learn what an insider threat is and how they can hurt an org...

Get the Latest on Information Security

We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.

Or get our RSS feed