Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Insight beyond annual risk using attack chain mapping

Thriving organizations maximally allocate resources. With seemingly infinite cybersecurity threats and finite resources, everyone needs to know the size of the threat to determine priority, and where to invest to maximize ROI. Elastic takes a quantified approach to cybersecurity risk management using FAIR to break threat scenarios into (A) likelihood and (B) losses to calculate risk per year, AKA annualized loss expectancy, or in FAIR terms, simply “risk”.

LogRhythm SIEM 7.20: Expanded Dashboard Visibility and Enhanced Data Ingestion

To maintain an effective self-hosted security strategy, security operations centers (SOCs) must invest in advanced tools that provide deep visibility, seamless data integration, and real-time insights. As part of our latest quarterly product release, LogRhythm SIEM 7.20 delivers on these needs with exciting new updates that empower security teams to detect threats faster, analyze larger datasets, and seamlessly integrate data sources.

Exabeam Launches the First Fully Integrated, Multi-Agent AI for Security Operations

Imagine a world-class chess grandmaster playing multiple opponents at once—anticipating moves, spotting patterns, and staying steps ahead of every competitor. Now, imagine if that grandmaster had an AI-powered assistant, constantly analyzing past games, predicting threats, and offering guidance in real time. That is what Exabeam is bringing to security operations.

The Story Behind Exabeam Nova: Shining a Light on Cybersecurity Threats

In the high-stakes world of cybersecurity, every detail matters — including the name of the technology designed to uplevel SOC teams to protect their organizations from ever-growing, ever-evolving threats. Naming isn’t just about branding; it’s about capturing purpose, function, and vision.

Exabeam Quarterly Product Launch - April 2025: Overview

Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity innovator, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR). Cutting-edge technology enhances security operations center performance, optimizing workflows and accelerating time to resolution.

Steve Wilson Introducing Exabeam Nova

Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity innovator, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR). Cutting-edge technology enhances security operations center performance, optimizing workflows and accelerating time to resolution.

Best Practices To Manage Cybersecurity for Digital Manufacturing

Like every industry, the manufacturing sector has embraced digital transformation to improve operations. Digital manufacturing uses technologies like Internet of Things (IoT) devices, data analytics, and cloud computing to improve production processes and gain efficiencies. With businesses increasingly embracing digital transformation, they face the challenge of securing interconnected systems.

Devo's Channel Chief on CRN Recognition and the Future of Security Partnerships

Estee Robinson leads global alliances for Devo and is responsible for defining and executing Devo’s channel strategy. She was named a 2025 Channel Chief by CRN, which recognizes influential leaders who drive the channel agenda and evangelize the importance of channel partnerships. Estee’s work on channel strategy helped land Devo in the CRN Partner Program Guide and inclusions in the CRN Cloud 100 and Security 100 lists for 2025.

Hunting with Elastic Security: Unmasking concealed artifacts with Elastic Stack insights

Attackers thrive in the shadows, using MITRE ATT&CK T1564 - Hide Artifacts to cloak their presence with hidden files, concealed processes, and manipulated registry keys. These stealth tactics allow adversaries to evade detection, persist undetected, and escalate their access — all while quietly exfiltrating data or disrupting operations. Imagine files, processes, and even user accounts disappearing in your environment without a trace.