|
By Exabeam
As autonomous and semi-autonomous AI systems take on more responsibility within the enterprise, they shift from being “features” of software to becoming true internal actors. They make decisions, take actions, call tools, orchestrate workflows, and influence other AI agents. With this evolution, we must confront an uncomfortable truth: the metrics and response patterns we built for deterministic software no longer work.
|
By Exabeam
Behavior Intelligence is a security operations model that detects risk by analyzing behavior, automates investigation and response using AI, and measures whether security outcomes are improving over time. It focuses on how users, systems, and AI agents operate rather than relying only on predefined rules or knowns indicators of compromise. This shift matters because modern attacks rarely look malicious at first. They look normal.
|
By Exabeam
Security operations teams face rising alert volumes, tighter staffing, and growing pressure to reduce risk without adding tools or people. If Microsoft Sentinel sits at the center of your environment, you may already see where it helps and where it starts to strain. For many teams, that moment shows up when detections lag, investigations drag, or too much work funnels to a small group of specialists.
|
By Exabeam
Comprehensive visibility and anomaly detection now available for agents built with Google Cloud's Agent Development Kit and multi-agent workflows via the upcoming Google Agent Gateway.
|
By Exabeam
The OWASP Top 10 for Agentic Applications defines the most common AI agent risks, but real attacks unfold across multiple stages of behavior. Behavioral analytics detects those risks by modeling how users, AI agents, and their interactions change over time. By observing deviations across inputs, processing, and outputs, security operations teams can identify insider‑driven and agent‑driven threats that traditional, event‑based detection misses.
|
By Exabeam
Anthropic’s latest Claude news shows how AI is compressing the time from vulnerability discovery to credentialed lateral movement, and why security teams need behavior-based detection across humans and AI agents. Anthropic’s Project Glasswing, announced on April 7, 2026, gives selected partners early access to Claude Mythos Preview for defensive cybersecurity work. Anthropic says the model has already identified thousands of zero-day vulnerabilities across critical infrastructure.
|
By Exabeam
Microsoft Sentinel gives security operations team visibility into activity across Microsoft environments. As those environments grow, many teams start looking for deeper behavioral context, more consistent investigations, and ways to reduce manual work without replacing what already works. That’s where the Exabeam Microsoft Sentinel Collector comes in.
|
By Exabeam
Applies behavior profiling and analytics to the digital workforce, giving security teams full visibility into how users and AI agents interact across the enterprise.
|
By Exabeam
Security operations demands precision and efficiency. Administrators manage complex environments, maintain data flow, uphold compliance, and keep the platform running at scale. Analysts work to quickly understand which alerts require action. Both roles depend on tools that reduce friction and help them move faster. The April 2026 LogRhythm SIEM release introduces updates that make daily security operations work more efficient.
|
By Exabeam
AI agents now participate directly in daily work. They write code, summarize data, generate documents, and automate tasks at a speed and scale no human can match. As your organization adopts more assistants and autonomous workflows, you introduce a new type of insider: an agent operating inside your systems with real identities, credentials, and privileges. Human and machine activity now blend inside enterprise environments. The shift expands insider risk in ways many teams can’t yet see.
|
By Exabeam
Cybersecurity debates tend to center on tools, frameworks, and threats. But Rob Knoblauch has built a 25-year career in global security leadership by focusing on the soft skills that determine whether a CISO survives, thrives, or burns out. In this episode of The New CISO, Rob joins Steve Moore to trace the through-line from running a multi-node BBS as a kid to serving as Deputy CISO of one of the world’s largest banks — and the career lessons he’s carried through every chapter.
|
By Exabeam
What does sharpening a knife over a case of onions have to do with incident response? For Myke Lyons, CISO at Cribl, the answer is everything. Myke trained at the Culinary Institute of America — learning speed and accuracy under the clock of a professional kitchen — before a summer IT job in Manhattan set him on an entirely different path. In this episode of The New CISO, host Steve Moore traces that journey and the surprising parallels between culinary craft and security leadership.
|
By Exabeam
Security teams today face machine-speed threats, growing complexity, and overwhelming data. Exabeam helps you stay ahead with powerful AI, behavioral analytics, and automation designed to accelerate threat detection, investigation, and response (TDIR). With hyper-fast search, advanced analytics, and intelligent automation, Exabeam enables security teams to uncover threats faster, reduce manual work, and gain insights other tools miss. Since 2014, we’ve put AI and machine learning at the core of security operations—helping organizations modernize their SOC and improve outcomes at scale.
|
By Exabeam
The small but mighty cyber security team at SA Power Networks, the sole electricity distributor for the state of South Australia, was challenged to keep up with numerous responsibilities, including preventive controls, patch management, and detect/respond functions. After choosing and implementing Exabeam, the platform has delivered the anticipated value: streamlining and accelerating the company’s TDIR function, strengthening security team bonds and collaboration, and cementing the critical link between security and business initiatives.
|
By Exabeam
In this episode of The New CISO, host Steve Moore speaks with Dean Sapp, CISO and Data Protection Officer at Filevine, about one of security's most critical yet overlooked skills—written communication. Drawing from a brutal college English class that failed students for a single typo and over 20 years building security programs in the legal tech industry, Dean reveals why the ability to articulate security findings clearly separates average professionals from exceptional leaders who drive real business impact.
|
By Exabeam
In this episode of The New CISO, host Steve Moore speaks with Manuel "Manu" Ressel, CISO at SAUTER Group, about his unconventional journey from classroom teacher to cybersecurity leader—and why the "Four Cs" of modern education provide a powerful framework for building effective security programs. Drawing from years as both a teacher and school principal in Germany, Manu introduces Critical Thinking, Communication, Collaboration, and Creativity as essential leadership skills that fundamentally challenge how the industry approaches awareness training and incident response.
The New CISO Podcast Ep. 139 - Alex Rice | Safety Third: Why Security Shouldn't Be Your Top Priority
|
By Exabeam
In this episode of The New CISO, host Steve Moore speaks with Alex Rice, Founder, CTO, and CISO at HackerOne, about challenging one of cybersecurity's most deeply held beliefs—that security should be the top priority. Drawing from his journey building security programs at Facebook and founding HackerOne, Alex introduces the "safety third" philosophy and explains why accepting that security is never first can actually make you more effective as a leader.
|
By Exabeam
Subscribe for more product demos and cybersecurity insights!
|
By Exabeam
At Exabeam, we don’t just build a security operations platform — we use it to protect ourselves. In this behind-the-scenes look at the Exabeam Security Operations Center (SOC), you’ll see exactly how Exabeam uses Exabeam to secure our corporate systems, customer data, cloud environments, and internal infrastructure.
|
By Exabeam
Partners from across the UKI region joined us in London for the Exabeam Security Intelligence Summit. This video captures highlights from our Partner Track, where we launched the new APEX Partner Program: built to drive profitability, accelerate enablement, and create the most partner-driven ecosystem in cybersecurity. Watch the recap of the event and see how we’re raising the bar – together. Subscribe for more product demos and cybersecurity insights!
|
By Exabeam
Two variants of Ransomware as a Service (RaaS) - REvil and Conti - are behind some of the most widespread and successful cyberattacks today. Don't let these ransomware attacks siege your operations. Download this white paper to learn how to use the MITRE ATT&CK Framework to improve your security posture, plus discover insightful tactics, techniques, and procedures (TTPs) used by REvil and Conti.
|
By Exabeam
In today's rapidly evolving digital landscape, the escalating frequency and sophistication of cyber threats underscore the critical need for robust IT security measures. The NIS2 Directive is the EU's latest effort to bolster cybersecurity across Member States, setting stringent security requirements for critical infrastructure and essential services.
|
By Exabeam
There are many tactics cybercriminals use to defeat MFA security measures, but one successful method is a tactic known as MFA Fatigue. In this white paper, we cover what MFA Fatigue is and how it functions, share examples of attacks, and provide guidance for detection and mitigation.
|
By Exabeam
When growing and maturing your security operations program, it's critical that you evaluate your program's overall effectiveness. After all, you will need to prove the value of your program to your board in order to gain future budgetary support. But what should you measure? And how do you start tracking your program's success?
|
By Exabeam
How do you prioritize the many threats to your organization? How do you address them with the tools you already have? MITRE ATT&CK, an open framework and knowledge base of adversary tactics and techniques based on real-world observations, provides a structured method to help you answer these questions. ATT&CK is a powerful way to classify and study adversary techniques and understand their intent. You can use it to enhance, analyze, and test your threat hunting and detection efforts.
- April 2026 (12)
- March 2026 (6)
- February 2026 (4)
- January 2026 (8)
- December 2025 (2)
- November 2025 (8)
- October 2025 (11)
- September 2025 (4)
- August 2025 (10)
- July 2025 (1)
- May 2025 (1)
- April 2025 (13)
- March 2025 (3)
- February 2025 (4)
- January 2025 (6)
- July 2024 (2)
Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity leader, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR).
Realize the full potential of your security operations with the cloud-native New-Scale Security Operations Platform, or the self-hosted LogRhythm SIEM Platform.
Leading AI-Driven Security Operations:
- Industry-Leading Detection: Expose the threats that other tools miss. Support strategic use cases with guidance on how to improve. Meet your compliance objectives.
- Faster, More Accurate TDIR: Reduce alert fatigue and accelerate your triage. GenAI-powered workflows speed analyst routines and up-level their skills.
- Rapid-Value, Unmatched Flexibility: Deploy a fully-featured SIEM with hundreds of integrations and the market’s most flexible deployment options: self-hosted, hybrid, or cloud-native.
Real Intelligence. Real Security. Real Fast.