Automated Detection & Response Blog

Return on Investment (ROI) on SOC Operations – From Noise to Signal
by Guest Blogger -Markus Malewski, Head of SOC/SIEM at ThyssenKrupp
There is often the question how to measure the return on investment on a SOC. It ...

Mrs. MSSP, is your TI Effective?
By Doron Davidson, Founder & VP Business Development, SecBI
As SecBI’s XDR Platform is gaining interest among MSSPs, we’ve been asked to create some intere...

The Remote Access Trojan (RAT), a Legacy Product at a Mass Market Price
By Arie Fred, VP of Product, SecBI
The Remote Access Trojan (RAT) can almost be considered the “legacy” tool of hackers. The RAT is a malware program that use...

Is Hotel Cyber Security Sleeping on the Job?
By Arie Fred, VP of Product, SecBI
When we think of burglars breaking into a house, our minds conjure up images of knitted hat-covered crim...

Attending CyberTech? Here are Suggestions for 10 Tel Aviv’s Must-Sees and 3 Easy...
By Sarah Mehlman, Marketing Manager, SecBI
Whether it’s your 1st or 100th time attending CyberTech Tel Aviv, exploring this unique city is always a must.
Fo...

When a Small Business Faces Big Cyber Threats, Network Security is No Tiny Feat
By Sarah Mehlman, Marketing Manager, SecBI
Let’s start with the obvious. No matter how large or small an organization, it faces daily cybersecurity threats.
...

Two’s Company, Three Makes It Work: The Missing Link in Email and Web Security
By Doron Davidson, Co-founder & VP Business Development, SecBI
There are several vendors in the cybersecurity landscape who address two major attack vector...

Reflections on the CrowdStrike – Zscaler Partnership
By Arie Fred, VP of Product, SecBI
I was always troubled by the lack of complete visibility in the network.
The endpoint security products were adequate for...

Cybersecurity Awareness Month
By Sarah Mehlman, Marketing Manager, SecBI
October is Cybersecurity Awareness Month, (although for those in the industry, awareness is a constant state of mind...