Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Exabeam Detects LLM Abuse for Google Cloud Model Armor

In this demo, see how the Exabeam New-Scale Security Operations Platform integrates with Google Cloud Model Armor to detect and stop abuse of large language models (LLMs). You’ll learn how Exabeam: Monitors AI activity for suspicious or malicious behavior Uses advanced analytics to spot LLM misuse in real time Helps security teams enforce responsible AI use policies Watch how Exabeam and Google Cloud work together to provide stronger visibility, detection, and protection against emerging threats targeting LLMs.

Introducing New-Scale Analytics - Analyst Workflow Demonstration

This video demonstration was produced for Exabeam Advanced Analytics customers who plan on upgrading to New-Scale Analytics. You'll learn what makes New-Scale Analytics such a powerful new solution for threat detection, investigation, and response (TDIR). LEARN MORE: Subscribe for more product demos and cybersecurity insights!

End-to-End AI in Security Operations | Exabeam Nova's 6 AI Agents Explained

Is your AI just a chatbot? Exabeam Nova delivers true end-to-end AI—from behavioral detections and automated investigations to natural language reports and intelligent case creation. Six purpose-built AI agents Full-cycle threat detection, investigation, response Subscribe for more product demos and cybersecurity insights!

The New CISO Podcast Ep.133 - Steve Lodin | Teachable Moments: How to Learn from Career Challenges

In this episode of The New CISO, host Steve Moore speaks with Steve Lodin, VP of Information Security at Sallie Mae, about the career challenges that shaped his leadership style and the lessons he’s learned across decades in cybersecurity.

Exabeam Demo: AI-Driven Behavioral Analytics for Smarter SOC Decisions

Designed for cybersecurity leaders and SOC decision makers, this walkthrough highlights how the Exabeam New-Scale Security Operations Platform transforms threat detection, investigation, and response. Key capabilities featured: Threat Center Workbench: Monitor high-value users and entities with real-time insights. Behavioral Risk Scoring: Combine statistical rarity with business context for smarter triage.