Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

How SA Power Networks Accelerated Threat Detection with Exabeam

The small but mighty cyber security team at SA Power Networks, the sole electricity distributor for the state of South Australia, was challenged to keep up with numerous responsibilities, including preventive controls, patch management, and detect/respond functions. After choosing and implementing Exabeam, the platform has delivered the anticipated value: streamlining and accelerating the company’s TDIR function, strengthening security team bonds and collaboration, and cementing the critical link between security and business initiatives.

What's new in Cloud SIEM: AI-powered investigations, enhanced threat intelligence, and scalable security operations

Security teams face a threat landscape shaped by AI-driven attacks and identity misuse. Adversaries increasingly rely on compromised identities to blend in as legitimate users, making attacks harder to detect and slower to contain. On average, organizations take 241 days to identify and contain a breach.1 While threats have evolved, legacy SIEMs have not kept pace.

Falcon Next-Gen SIEM Supports Third-Party EDR Tools, Starting with Microsoft Defender

CrowdStrike is expanding CrowdStrike Falcon Next-Gen SIEM to support third-party endpoint detection and response (EDR) solutions — beginning with Microsoft Defender — with no Falcon sensor required. This evolution will enable organizations to modernize their SOC without replacing existing endpoint agents. Adversaries are moving faster than ever, exploiting cross-domain gaps across endpoint, identity, network, and cloud.

Meet Exabeam Sherpa: The AI Backbone of Our NextGeneration Partner Experience

Today’s partners don’t need more portals, more PDFs, or more one‑time training sessions. They need momentum. That’s why we built Exabeam Sherpa, an AI‑powered, always‑on virtual Channel Account Manager (CAM) designed to help partners ramp faster, sell smarter, and scale performance as their teams grow.

The Essential Eight: The Foundation of Australian Compliance

The Australian Signals Directorate (ASD) is the overarching agency that incorporates the Australian Cyber Security Centre (ACSC), the government’s technical cybersecurity authority. In 2018, the ASD became a statutory agency, assuming responsibility for the Computer Emergency Response Team Australia and the Digital Transformation Agency.

Slack, Teams & Google Chat in Your SIEM: Why Collaboration Audit Logs Matter

The modern workplace has a new “system of record,” and it isn’t email. Today, approvals, incident coordination, customer escalations, vendor conversations, quick file shares, and “can you grant access?” requests happen in Slack channels, Teams chats, and Google Chat spaces, often at a pace that makes formal controls feel optional.

The Stryker Cyberattack: Why Endpoint and Mobile Device Monitoring Matter

Recent reports of a cyberattack targeting medical device manufacturer Stryker highlight a growing challenge for modern organizations: maintaining visibility across every device connected to their networks. The Michigan-based healthcare technology company reported a global network disruption affecting its Microsoft environment following a cyberattack.

Log Correlation for Security and Performance Monitoring

International travel comes with amazing sights, cultural experiences, and local delicacies. However, most travelers know that it comes with differing economies that impact a money’s value and various currencies. When people need cash, they have to translate the money in their wallets to the local currency, which means different coins and bills. Depending on the exchange rate, the currency’s value can change as the person moves from one country to another.