Play Demo

Automated Detection & Response Blog

Jeopardy
The “JEOPARDY” of Cyber Security
By Ravid Circus, Director of Presales, SecBI One of my fondest childhood memories is sitting in the living room with my parents and siblings glued to the telev...
Hands painted hearts
Show your security analysts some love this Valentine’s day
By Doron Davidson, Founder and VP of Business Development, SecBI Valentine’s day is a global celebration of love. People across the globe expect their signific...
alert
Return on Investment (ROI) on SOC Operations – From Noise to Signal
by Guest Blogger -Markus Malewski, Head of SOC/SIEM at ThyssenKrupp   There is often the question how to measure the return on investment on a SOC. It ...
machine learning
Mrs. MSSP, is your TI Effective?
By Doron Davidson, Founder & VP Business Development, SecBI As SecBI’s XDR Platform is gaining interest among MSSPs, we’ve been asked to create some intere...
Remote Access Trojan
The Remote Access Trojan (RAT), a Legacy Product at a Mass Market Price
By Arie Fred, VP of Product, SecBI The Remote Access Trojan (RAT) can almost be considered the “legacy” tool of hackers.  The RAT is a malware program that use...
hotel cybersecurity
Is Hotel Cyber Security Sleeping on the Job?
By Arie Fred, VP of Product, SecBI When we think of burglars breaking into a house, our minds conjure up images of knitted hat-covered crim...
cybertech
Attending CyberTech? Here are Suggestions for 10 Tel Aviv’s Must-Sees and 3 Easy...
By Sarah Mehlman, Marketing Manager, SecBI Whether it’s your 1st or 100th time attending CyberTech Tel Aviv, exploring this unique city is always a must. Fo...
cyber defense
When a Small Business Faces Big Cyber Threats, Network Security is No Tiny Feat
By Sarah Mehlman, Marketing Manager, SecBI Let’s start with the obvious. No matter how large or small an organization, it faces daily cybersecurity threats. ...
cybersecurity
Two’s Company, Three Makes It Work: The Missing Link in Email and Web Security
By Doron Davidson, Co-founder & VP Business Development, SecBI There are several vendors in the cybersecurity landscape who address two major attack vector...
© 2021 SecBI Terms of Use Privacy