Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

How AI is transforming Elastic's Security team

Spending hours creating threat intelligence reports is a thing of the past with our InfoSec AI Assistant, built on Elastic’s Search AI Platform. Mandy Andress, our CISO, shares how the AI Assistant has transformed the way our security team gathers, documents, and reports on threats — cutting report-building time by over 75%. Learn how we’re using generative AI to build threat intelligence reports quickly, assess relevance and risk faster, and shift from reactive defenses to proactive security strategies.

CrowdStrike Named a Visionary in 2025 Gartner Magic Quadrant for Security Information and Event Management

We are thrilled to announce that CrowdStrike Falcon Next-Gen SIEM has been named a Visionary in the 2025 Gartner Magic Quadrant for Security Information and Event Management (SIEM). Falcon Next-Gen SIEM is reimagining SIEM with AI, real-time data, and a unified platform approach, delivering the automation, speed, and control to transform SOC operations and power the agentic SOC.

Exabeam Nova: The First Autonomous Multi-Agent AI for Cybersecurity

Security teams are in an AI arms race — facing massive data volumes, insider threats, and adversaries using AI to find vulnerabilities and launch faster, smarter attacks. Exabeam changes the game with Exabeam Nova, the first autonomous multi-agent AI purpose-built for security operations. Fully embedded within the New-Scale Security Operations Platform, Exabeam Nova delivers measurable outcomes across threat detection, investigation, and response.

SIEM's Next Chapter: Evolving, Not Dying

The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a SOC, you already know the need for centralized, contextualized visibility is not going anywhere. What is changing the future of SIEM, is how SIEM delivers it. If you are still thinking of SIEM as a clunky, high-cost log hoarder, you are stuck in the wrong decade.

Exabeam Appoints Pete Harteveld as CEO

BROOMFIELD, Colo. & FOSTER CITY, Calif. - October 8, 2025 - Exabeam, a global leader in intelligence and automation that powers security operations, today announced Pete Harteveld as Chief Executive Officer. The leadership transition follows the decision by Chris O'Malley to step into retirement after three years of dedicated service to the company and over 30 years of executive leadership.

AI can do what now?! Agentic AI is the autonomous future coming to security operations

Agentic AI in cybersecurity promises to transform workflows as we know them, enabling a new level of personalization, automation, efficiency, and innovation. It’s already being deployed by security teams for use cases like autonomous threat detection and response, advanced threat hunting, automated incident investigation, real-time fraud protection, and more. So, how is agentic AI working overtime to help security analysts build a more resilient security posture?

The New CISO Podcast Ep.134 - Evan Ferree | From Breach to BISO: Becoming a Security Influencer

Most security professionals know what a CISO does. But what about a BISO? And why are Fortune 500 companies increasingly creating this executive role? In this episode of The New CISO Podcast, host Steve Moore sits down with Evan Ferree, Staff Vice President and Business Information Security Officer at a Fortune 50 company, to decode one of cybersecurity's most misunderstood leadership positions. What You'll Learn.

How Exabeam Detects LLM Abuse for Google Cloud Model Armor

In this demo, see how the Exabeam New-Scale Security Operations Platform integrates with Google Cloud Model Armor to detect and stop abuse of large language models (LLMs). You’ll learn how Exabeam: Monitors AI activity for suspicious or malicious behavior Uses advanced analytics to spot LLM misuse in real time Helps security teams enforce responsible AI use policies Watch how Exabeam and Google Cloud work together to provide stronger visibility, detection, and protection against emerging threats targeting LLMs.

How Graylog Helps You Spot LockBit-Style Attacks Sooner

The DFIR Report recently detailed a LockBit attack with ransomware intrusion that succeeded without advanced exploits or zero-day vulnerabilities. The attack relied on a stolen AnyDesk installer, credential reuse, and renamed PowerShell scripts that blended into routine activity. These moves were not sophisticated, but they were fast and effective. The end result: complete domain encryption.