News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Exabeam improves security analytics in the cloud
Exabeam improves security analytics in the cloud

Exabeam improves security analytics in the cloud with Fusion XDR and Fusion SIEM. New Fusion security solutions automate 100 percent of the TDIR workflow. Automated threat detection, investigation, and response products provide comprehensive security in the cloud. Exabeam, the security analytics and automation company, today announced two new cloud-based security solutions, Exabeam Fusion XDR and Exabeam Fusion SIEM. The two new products enable efficient threat detection, investigation and response (TDIR) in the cloud without affecting a company's existing technology stack. Threat detection, investigation and response in ...

Read more

Protection: Exabeam's new TDIR framework
Protection: Exabeam's new TDIR framework

Exabeam's new TDIR framework for threat detection, investigation & response addresses very specific IT security challenges and simplifies work processes. Exabeam, specialist in security analysis and automation, has equipped its product portfolio with numerous new functions. With these functions, Exabeam helps analysts in the Security Operations Center (SOC) to improve all work processes with regard to their IT security. As the most important new function, Exabeam's Security Management Platform for the first time receives preconfigured packages for Threat Detection, Investigation & Response (TDIR) for three very specific threat categories: External threats, compromised insiders and malicious insiders. TDIR - Threat Detection, Investigation & Response ...

Read more

Cybersecurity with an inward view
Cybersecurity with an inward view - ransomware

Central defense: cybersecurity with an inward view. Due to the threat situation, organizations are strengthening their defense against cyber attacks from outside. In doing so, however, they often forget to look inward. New technologies help stop attackers who are already on the network. For cyber criminals, the corona crisis and its consequences mean a gold rush mood - never before have many companies been as vulnerable as they are today. However, IT security is slowly following in order to secure the attack surface, which has been enlarged by the distributed employees - and increases the security walls around the company and its employees in the home office. Many overlook ...

Read more

Unmask IT insider threats with analytics
Unmask IT insider threats with analytics

Threats from “IT insiders” make many IT security departments sweat with fear. And rightly so, because they are already firmly anchored in the company's IT. They represent a particularly high risk after being compromised because they can hardly be recognized by normal security mechanisms that are directed towards the outside world. So it is difficult to fully protect against insider threats using traditional means. In order to arm themselves against insider threats and to uncover what is happening within the organization, organizations need the right strategies and technical solutions that go beyond traditional methods of IT security ...

Read more

Analytics for social engineering attacks
Social engineering attacks

In the case of social engineering attacks, analytics can identify much more quickly and minimize damage. Training and security tools alone are not enough. Analytics can complete a defense strategy against social engineering. Social engineering has always been a major threat to every internet user, both as an individual or as part of a company. Cyber ​​criminals know that humans are the weakest link in the security chain and are increasingly relying on social engineering attacks to compromise systems and networks and gain access to sensitive data. In contrast to machines and security software, we humans tend to misjudge and ...

Read more

Detect hacker attacks earlier
Hacker attack

In companies, it is always important to detect hacker attacks as early as possible. A behavior analysis helps to shorten the "dwell time" of successful attacks. In films, hacks are often portrayed as a kind of digital bank robbery: the hackers break through the protective mechanisms of their target in a dramatic way and then only have a few minutes to steal the coveted data, while IT security tries desperately to stop the attackers. The reality looks very different, because in fact the cyber criminals usually make themselves comfortable in the network and sometimes spend months or years there ...

Read more

Study: Corona is driving IT security into the cloud
Cloud computing

A new Exabeam study shows: Corona is driving IT security into the cloud. The home office has accelerated the use of cloud-based security tools. Exabeam presented the results of a survey of security practitioners on the introduction and use of cloud-based security tools. This latest survey was carried out as a comparative sample of a study carried out in March 2020. This allows direct conclusions to be drawn about the influence of the corona crisis on the use of cloud-based security tools. Unsurprisingly, there was an increase in the use of the cloud for parts of IT security: At the beginning of the year, 75 percent of those surveyed were already using ...

Read more

Twitter hack: Insiders remain the greatest risk
Exabeam_n

“The key to successfully uncovering such an attack is to be able to identify changes in user behavior.” Comment by Egon Kando, Exabeam “The coordinated social engineering attack on Twitter is unprecedented. What seems clear at this point is that it is an attack based on compromised user data, either by unsuspecting employees or via an allegedly malicious insider on the network. Both of these things often happen, as almost half of all data breaches are caused, consciously or unconsciously, by some type of insider threat. You cannot always trust your own employees. Almost all ...

Read more