Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Exabeam Security Intelligence Summit UKI 2025 | Event Highlights & Key Takeaways

Relive the highlights from the Exabeam Security Intelligence Summit in London, where security leaders, users, and partners across the UK and Ireland gathered for a day of innovation and collaboration. From breakthrough AI advancements in SIEM and UEBA to inspiring customer success stories and hands-on breakout sessions, this event was more than just a conference, it was a community redefining the future of cybersecurity. Don’t miss the energy, insights, and connections that made this summit one to remember.

Stopping USB-borne attacks at the endpoint with Elastic Security Device Control

In today’s enterprise environments, endpoints are more than just laptops and desktops. They are the critical bridge where people, applications, and data intersect. While much attention is given to malware prevention and threat detection, one security layer is often underestimated: device control.

How AI Cuts SIEM Migration Time from Months to Minutes

SIEM migration is tedious, time-consuming, and pulls security professionals away from actual security work. Manually exporting thousands of detection rules, translating query logic, and fixing errors can take weeks or months. In this episode of AI can do what now?!, Haran Kumar (principal security solutions architect at Elastic) walks through how AI actually helps automate SIEM migration.

Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

Logs & Lattes: Episode 3 - Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

Advanced vector search in air-gapped environments

For organizations in air-gapped environments with no external network connection, implementing the latest search and AI technology can be challenging, often to the point of impossibility. However, Elastic’s customers in highly sensitive industries, such as national security and defense, have relied on Elastic’s agile technology for over a decade, trusting it for mission-critical use cases in air-gapped environments or even on tech kits.

How Behavioural Analytics Strengthens Compliance with Australia's Protective Security Policy Framework (PSPF)

The Australian Government’s Protective Security Policy Framework (PSPF) sets mandatory requirements for government entities to safeguard their people, information, and resources. As agencies rely more on digital systems, how can you meet these expectations? Behavioural analytics is designed for a today’s hybrid environments, where threats can be human or automated.

Seeing the Invisible: Visualizing and Protecting AI-Agent Activity with Exabeam & Google

Artificial intelligence is no longer just an emerging technology in security operations and modern SIEMs. AI agents now enrich alerts, drive investigations, generate reports, and increasingly act as extensions of human analysts. But as with any powerful technology, new risk surfaces follow. From the Exabeam perspective, every entity in your environment deserves protection.

Overcoming Cybersecurity and Risk Management Challenges

Every time you leave your home, you take various risks, like being in a car accident or being struck down by a meteor. In some cases, like the meteor, the likelihood of the event is so low as to be nearly nonexistent. In others, like the car accident, the likelihood might be higher. Similarly, every technology that you connect to your networks creates a cybersecurity security risk. Any device or application that connects to the public internet can be an entry point for attackers.