Play Demo

Automated Detection & Response Blog

cyber defense
Where are your greatest threats coming from?: Inside or Outside?
By Ethan Milgram, Head of Sales, SecBI A recent report from Kaspersky Labs revealed that 90% of cybersecurity attacks are due to human error. That is a stagger...
AI
AI-based endpoint protection (EDR or AV) can be fooled a.k.a. our AI is bigger t...
By Arie Fred, VP of Product, SecBI Last week, security researchers announced to the world that they have managed to outsmar...
EDR
A Better View to Detect What EDRs Miss
By Arie Fred, VP of Product, SecBI Endpoint detection & response (EDR) security has been hailed by analysts and the industry alike as the “next big thing” ...
malware
Lucky number seven: Malware Detection after seven years
By Arie Fred, VP of Product, SecBI Several APT campaigns were in action for SEVEN years before being identified. Researchers from endpoint response detectio...
Slack
Slack as a C2 (Command and Control) Channel
By Arie Fred, VP of Product, SecBI As Slack, the popular messaging platform, went public, its stock prices soared, signaling investors’ confidence in this work...
cyberweek
How to Survive CyberWeek: A Complete Guide
By Sarah Mehlman, Marketing Manager, SecBI As Tel Aviv University’s cyberweek approaches, many cybersecurity experts are pr...
cybersecurity
Is Admitting You’re One Step Behind Attackers the Key to Getting in Front ...
By Arie Fred, VP of Product, SecBI While cyber defenders work to protect their networks, hackers and more sophisticated nation-state attackers focus on develop...
SIEM
SIEMs to be Obsolete
By Daniel Felman, Lead Data Scientist, SecBI In 2005 the concept of Security Information and Event Management (SIEM) combining SIMs and SEMs was first coined. ...
packet capture
When the Results are as Good if not Better, Why Bother with Packet Capture in NT...
By Gilad Peleg, CEO of SecBI Gartner Analyst, Anton Chuvakin wrote “The escalating sophistication of threats requires organizations to use multiple sources of ...
© 2020 SecBI Terms of Use Privacy