Play Demo

Automated Detection & Response Blog

Hands painted hearts
Show your security analysts some love this Valentine’s day...
By Doron Davidson, Founder and VP of Business Development, SecBI Valentine’s day is a global celebration of love. People across the globe expect their signific...
alert
Return on Investment (ROI) on SOC Operations – From No...
by Guest Blogger -Markus Malewski, Head of SOC/SIEM at ThyssenKrupp   There is often the question how to measure the return on investment on a SOC. It ...
machine learning
Mrs. MSSP, is your TI Effective?...
By Doron Davidson, Founder & VP Business Development, SecBI As SecBI’s XDR Platform is gaining interest among MSSPs, we’ve been asked to create some intere...
Remote Access Trojan
The Remote Access Trojan (RAT), a Legacy Product at a Mass M...
By Arie Fred, VP of Product, SecBI The Remote Access Trojan (RAT) can almost be considered the “legacy” tool of hackers.  The RAT is a malware program that use...
hotel cybersecurity
Is Hotel Cyber Security Sleeping on the Job?...
By Arie Fred, VP of Product, SecBI When we think of burglars breaking into a house, our minds conjure up images of knitted hat-covered crim...
cybertech
Attending CyberTech? Here are Suggestions for 10 Tel Aviv’s ...
By Sarah Mehlman, Marketing Manager, SecBI Whether it’s your 1st or 100th time attending CyberTech Tel Aviv, exploring this unique city is always a must. Fo...
cyber defense
When a Small Business Faces Big Cyber Threats, Network Secur...
By Sarah Mehlman, Marketing Manager, SecBI Let’s start with the obvious. No matter how large or small an organization, it faces daily cybersecurity threats. ...
cybersecurity
Two’s Company, Three Makes It Work: The Missing Link in Emai...
By Doron Davidson, Co-founder & VP Business Development, SecBI There are several vendors in the cybersecurity landscape who address two major attack vector...
zscaler and crowdstrike
Reflections on the CrowdStrike – Zscaler Partnership...
By Arie Fred, VP of Product, SecBI I was always troubled by the lack of complete visibility in the network. The endpoint security products were adequate for...
© 2020 SecBI Terms of Use Privacy