Prudential Standard CPS 234: How Exabeam Aligns With the New Australian Financial Standard
With the launch of the new prudential standard CPS 234 by the Australian Prudential Regulation Authorities (APRA), a[…]
UEBA uses machine learning and data science to gain an understanding of how users (humans) within an environment typically behave, then find risky and anomalous activity that deviates from their normal behavior that may be indicative of a threat.
The data breach at Capital One that exploited a vulnerability in the cloud reported a few weeks ago was one of the largest-ever bank data thefts. We look at how it maps to the MITRE ATT&CK framework and how it could have been detected.
The term SIEM was first coined by Gartner in 2005. Now modern SIEMs offer new capabilities to provide unparalleled visibility and automation to improve threat detection, enhance analyst productivity, and decrease logging costs. But a SIEM replacement is a big investment in time and resources. Find out how you can perform a SIEM tech refresh with Exabeam’s modular platform.
Many vendors claim to offer user and entity behavior analytics (UEBA) capabilities, but a variety of implementations make comparative evaluations difficult. Find out the top 10 criteria for evaluating an effective UEBA technology to guide the selection of the right solution for your business.
For cybersecurity teams, getting in front of security threats is a top priority. But with so many potential threats and adversaries, putting in place appropriate threat detection can seem a daunting task. Breaking down threat detection and a response to the most basic elements can bring that clarity.
Ransomware was responsible for recent outages in the city of Baltimore and the Cleveland Airport. How do you detect the threat and what can you do about it. To start we look at how a ransomware attack works.
Read about the new genus of malware that breaks the rules of traditional detection and defense methods. Called fileless malware, it’s unlike other breeds of malware that require the installation of software on a victim’s machine. According to the Ponemon Institute, it accounts for 35% of all cyberattacks in 2018.