Security
-
SIEM Best Practices to Help You Comply With Indonesia’s Personal Data Protection Law
Indonesia has taken a bold step forward in safeguarding personal data. As one of most populated countries in the world,…
Read More » -
Essential Commands And Quick References
Running parallel processes on a graphical user interface (GUI) usually requires tabbed terminals. But what if you could only work…
Read More » -
Why I Joined Exabeam: A Security Professional’s Journey to Innovation and Balance
A Journey Through Security Throughout my career, I’ve worked across a wide range of security technologies in product management and…
Read More » -
The Rise of Script Kiddies in an AI World
Artificial intelligence (AI) is being touted, across the board, as an accelerator for businesses of all shapes, sizes, and moral…
Read More » -
Demand Gen Emails That Convert: Proven Tactics for Marketers
Every buyer has an email address, but with inboxes overflowing, the challenge for marketers isn’t just reaching an audience…
Read More » -
AI at the Core: Elevating Steve Wilson to Chief AI and Product Officer
At a recent industry event, Gartner shared that 74% of CEOs believe AI will be the most impactful technology to…
Read More » -
How to Hack Using Google
Google dorks can help you uncover leaked passwords and sensitive data, let you view neighborhoods from unsecured cameras, access files…
Read More » -
How to Use Ligolo-ng (Easy to Follow Pivoting Tutorial)
Are you tired of hitting roadblocks when pivoting through a target network? As a penetration tester or ethical hacker, finding…
Read More » -
Attack of the Clones – How Generative AI Tools Are Redefining Phishing
Phishing has long been the bread and butter of cybercrime — a low-cost, high-reward tactic that relies on one simple…
Read More » -
The story behind Exabeam Nova, the autonomous AI agent for security operations| Exabeam
A New Star for Security Operations In the high-stakes world of cybersecurity, every detail matters — including the name of…
Read More »