Play Demo

Blog

Remote Access Trojan
The Remote Access Trojan (RAT), a Legacy Product at a Mass M...
By Arie Fred, VP of Product, SecBI The Remote Access Trojan (RAT) can almost be considered the “legacy” tool of hackers.  The RAT is a malware program that use...
hotel cybersecurity
Is Hotel Cyber Security Sleeping on the Job?...
  By Arie Fred, VP of Product, SecBI When we think of burglars breaking into a house, our minds conjure up images of knitted hat-co...
cybertech
Attending CyberTech? Here are Suggestions for 10 Tel Aviv’s ...
  By Sarah Mehlman, Marketing Manager, SecBI Whether it’s your 1st or 100th time attending CyberTech Tel Aviv, exploring this unique city is always a m...
cyber defense
When a Small Business Faces Big Cyber Threats, Network Secur...
By Sarah Mehlman, Marketing Manager, SecBI Let’s start with the obvious. No matter how large or small an organization, it faces daily cybersecurity threats. ...
cybersecurity
Two’s Company, Three Makes It Work: The Missing Link in Emai...
  By Doron Davidson, Co-founder & VP Business Development, SecBI There are several vendors in the cybersecurity landscape who address two major att...
zscaler and crowdstrike
Reflections on the CrowdStrike – Zscaler Partnership...
  By Arie Fred, VP of Product, SecBI I was always troubled by the lack of complete visibility in the network. The endpoint security products were ad...
cybersecurity awareness month
Cybersecurity Awareness Month...
  By Sarah Mehlman, Marketing Manager, SecBI October is Cybersecurity Awareness Month, (although for those in the industry, awareness is a constant sta...
github
Bank leaves sensitive data exposed on GitHub repositories...
  By Arie Fred, VP of Product, SecBI A North American bank stored highly sensitive digital property in a series of publicly open and accessible GitHub ...
cryptomining
Crypto mining- deep, dark and profitable...
  By Arie Fred, VP of Product, SecBI Crypto-mining (or crypto-jacking) malware campaigns climbed 29 percent from Q4 2018 to Q1 2019 according to a new ...
© 2020 SecBI Terms of Use Privacy