<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Security Leadership</provider_name><provider_url>https://heliview.com/security-leadership</provider_url><title>Whitepaper: Exabeam Fusion - Security Leadership</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="wMowWgJCSm"&gt;&lt;a href="https://heliview.com/security-leadership/whitepaper-exabeam-fusion/"&gt;Whitepaper: Exabeam Fusion&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://heliview.com/security-leadership/whitepaper-exabeam-fusion/embed/#?secret=wMowWgJCSm" width="600" height="338" title="&#x201C;Whitepaper: Exabeam Fusion&#x201D; &#x2014; Security Leadership" data-secret="wMowWgJCSm" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://heliview.com/security-leadership/wp-content/uploads/sites/19/2023/02/Linkedin_Background.jpeg</thumbnail_url><thumbnail_width>1400</thumbnail_width><thumbnail_height>350</thumbnail_height><description>[vc_row][vc_column width=&#x201D;2/3&#x2033;][vc_column_text]Security operations success needs to be redefined, and it starts with the SIEM. As the IT infrastructure shifts into the cloud, the entire security portfolio needs to scale and follow suit. Legacy approaches force security operations teams to manage massive amounts of data across billions of events, but they don&#x2019;t show the complete picture [&hellip;]</description></oembed>
