{
	"id": "eaab195c-ba99-4636-9da0-e81d87f1a1c7",
	"created_at": "2026-04-06T00:16:50.98036Z",
	"updated_at": "2026-04-10T03:21:13.10786Z",
	"deleted_at": null,
	"sha1_hash": "7ef7d0f2f8a5659a1ddfee6737799906c1cec7d4",
	"title": "Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 325786,
	"plain_text": "Blog\r\nArchived: 2026-04-05 12:45:36 UTC\r\nLearn More About Exabeam\r\nLearn about the Exabeam platform and expand your knowledge of information security with our collection of\r\nwhite papers, podcasts, webinars, and more.\r\nhttps://logrhythm.com/blog/how-government-agencies-can-defend-against-exfiltration-tactics/\r\nPage 1 of 3\n\nShow More\r\nSee Exabeam in Action\r\nRequest more information or request a demo of the industry’s most powerful platforms for threat detection,\r\ninvestigation, and response (TDIR).\r\nLearn more:\r\nIf self-hosted or cloud-native SIEM is right for you\r\nHow to ingest and monitor data at cloud scale\r\nHow monitoring and analyzing AI and automated agent behavior uncovers risky non-human activity\r\nHow to automatically score and profile user activity\r\nSee the complete picture using incident timelines\r\nWhy playbooks help make the next right decision\r\nSupport compliance mandates\r\nhttps://logrhythm.com/blog/how-government-agencies-can-defend-against-exfiltration-tactics/\r\nPage 2 of 3\n\n*\r\n*Phone Number:\r\n*Phone Number\r\nBy filling out this form and clicking the submit button you are agreeing to receive email communications from\r\nExabeam regarding cybersecurity events, webinars, research, and more. Don’t worry, you will be able to\r\nunsubscribe at anytime. View our Privacy Policy. If you have any questions, please reach out to\r\nprivacy@exabeam.com.\r\nThank you for requesting a demo. A representative will be contacting you shortly to schedule a\r\nconvenient time.\r\nSource: https://logrhythm.com/blog/how-government-agencies-can-defend-against-exfiltration-tactics/\r\nhttps://logrhythm.com/blog/how-government-agencies-can-defend-against-exfiltration-tactics/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia"
	],
	"references": [
		"https://logrhythm.com/blog/how-government-agencies-can-defend-against-exfiltration-tactics/"
	],
	"report_names": [
		"how-government-agencies-can-defend-against-exfiltration-tactics"
	],
	"threat_actors": [],
	"ts_created_at": 1775434610,
	"ts_updated_at": 1775791273,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7ef7d0f2f8a5659a1ddfee6737799906c1cec7d4.pdf",
		"text": "https://archive.orkl.eu/7ef7d0f2f8a5659a1ddfee6737799906c1cec7d4.txt",
		"img": "https://archive.orkl.eu/7ef7d0f2f8a5659a1ddfee6737799906c1cec7d4.jpg"
	}
}