User and Entity Behavior Analytics (UEBA) is the application of machine learning and security research to determine when users or entities are acting in unusual and risky ways.
Good UEBA doesn’t require static, predefined rules to detect threats, and can therefore evolve along with new techniques enabling your SIEM to be more efficient and effective.
Cybercrimes are continually evolving. Make the Exabeam website and blog a regular source for your information security knowledge.
Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.Or get our RSS feed
Keeping track of cyber threats isn’t easy. As soon as expe...
Every few months, a publicized breach reminds us that standa...
As a one of Latin America’s largest beverage services and ...
Managing your organization’s security requires you to find...
Stolen credentials have been a persistent problem, and organ...
Author: Sherry Lowe, Chief Marketing Officer The world’s g...
What Is ethical hacking? Ethical hacking is a practice where...
Cloud DLP enables organizations to protect data residing in ...
Vital infrastructure has become an area of concern for cyber...
Get the Latest on Information Security
We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.Or get our RSS feed
What Is an Insider Threat? Understand the Problem and Discover 4 Defensive Strategies
February 1, 2021
Using Advanced Analytics to Detect and Stop Threats [White Paper]
September 15, 2020
FEMSA Improves Security and Supercharges Their SOC With Exabeam
August 27, 2020
What the Twitter Attack Teaches Us About Manipulated Insiders
August 4, 2020
Advanced Analytics Use Case: Detecting Compromised Credentials
July 24, 2020
Detecting Credential Stuffing Attacks and Lateral Movement
June 11, 2020
Securing Your Remote Workforce, Part 4: How to Detect Fraudulent Logins and Policy Violations Using UEBA
April 9, 2020